Sciweavers

3652 search results - page 233 / 731
» A study of query length
Sort
View
PERCOM
2011
ACM
12 years 12 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
EDBT
2012
ACM
224views Database» more  EDBT 2012»
11 years 10 months ago
Aggregate queries on probabilistic record linkages
Record linkage analysis, which matches records referring to the same real world entities from different data sets, is an important task in data integration. Uncertainty often exi...
Ming Hua, Jian Pei
ICDE
2002
IEEE
147views Database» more  ICDE 2002»
14 years 9 months ago
Decoupled Query Optimization for Federated Database Systems
We study the problem of query optimization in federated relational database systems. The nature of federated databases explicitly decouples many aspects of the optimization proces...
Amol Deshpande, Joseph M. Hellerstein
ICDT
2009
ACM
109views Database» more  ICDT 2009»
14 years 9 months ago
TOP-K projection queries for probabilistic business processes
A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specific...
Daniel Deutch, Tova Milo
WWW
2007
ACM
14 years 9 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins