Sciweavers

325 search results - page 37 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
VLDB
1992
ACM
151views Database» more  VLDB 1992»
13 years 11 months ago
A Uniform Approach to Processing Temporal Queries
Research in temporal databases has mainly focused on defining temporal data models by extending existing models, and developing access structures for temporal data. Little has bee...
Umeshwar Dayal, Gene T. J. Wuu
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 7 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
PODS
2005
ACM
96views Database» more  PODS 2005»
14 years 7 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
DGO
2003
121views Education» more  DGO 2003»
13 years 9 months ago
Extending Metadata Definitions by Automatically Extracting and Organizing Glossary Definitions
Metadata descriptions of database contents are required to build and use systems that access and deliver data in response to user requests. When numerous heterogeneous databases a...
Eduard H. Hovy, Andrew Philpot, Judith Klavans, Ul...
KDD
2007
ACM
167views Data Mining» more  KDD 2007»
14 years 8 months ago
Generalized component analysis for text with heterogeneous attributes
We present a class of richly structured, undirected hidden variable models suitable for simultaneously modeling text along with other attributes encoded in different modalities. O...
Xuerui Wang, Chris Pal, Andrew McCallum