Sciweavers

21108 search results - page 4135 / 4222
» A General Class of Models of
Sort
View
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 28 days ago
Efficient top-k count queries over imprecise duplicates
We propose efficient techniques for processing various TopK count queries on data with noisy duplicates. Our method differs from existing work on duplicate elimination in two sign...
Sunita Sarawagi, Vinay S. Deshpande, Sourabh Kasli...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 28 days ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
GCB
2009
Springer
154views Biometrics» more  GCB 2009»
14 years 28 days ago
Comparative Identification of Differential Interactions from Trajectories of Dynamic Biological Networks
Abstract: It is often challenging to reconstruct accurately a complete dynamic biological network due to the scarcity of data collected in cost-effective experiments. This paper ad...
Zhengyu Ouyang, Mingzhou Song
SIGMOD
2010
ACM
259views Database» more  SIGMOD 2010»
14 years 25 days ago
An extensible test framework for the Microsoft StreamInsight query processor
Microsoft StreamInsight (StreamInsight, for brevity) is a platform for developing and deploying streaming applications. StreamInsight adopts a deterministic stream model that leve...
Alex Raizman, Asvin Ananthanarayan, Anton Kirilov,...
ACISP
2006
Springer
14 years 24 days ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
« Prev « First page 4135 / 4222 Last » Next »