Sciweavers

620 search results - page 89 / 124
» Algorithms for Rewriting Aggregate Queries Using Views
Sort
View
164
Voted
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 8 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
130
Voted
ICPP
1993
IEEE
15 years 7 months ago
Meta-State Conversion
Abstract — In MIMD (Multiple Instruction stream, Multiple Data stream) execution, each processor has its own state. Although these states are generally considered to be independe...
Henry G. Dietz, G. Krishnamurthy
127
Voted
CIDR
2007
185views Algorithms» more  CIDR 2007»
15 years 5 months ago
Rethinking Data Management for Storage-centric Sensor Networks
Data management in wireless sensor networks has been an area of significant research in recent years. Many existing sensor data management systems view sensor data as a continuou...
Yanlei Diao, Deepak Ganesan, Gaurav Mathur, Prasha...
ICDE
2010
IEEE
219views Database» more  ICDE 2010»
16 years 3 months ago
PIP: A Database System for Great and Small Expectations
Estimation via sampling out of highly selective join queries is well known to be problematic, most notably in online aggregation. Without goal-directed sampling strategies, samples...
Oliver Kennedy, Christoph Koch
135
Voted
VLDB
2007
ACM
115views Database» more  VLDB 2007»
15 years 10 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu