Sciweavers

14386 search results - page 2816 / 2878
» Algorithms for user interfaces
Sort
View
EDBT
2010
ACM
135views Database» more  EDBT 2010»
14 years 5 months ago
Region-based online promotion analysis
This paper addresses a fundamental and challenging problem with broad applications: efficient processing of region-based promotion queries, i.e., to discover the top-k most inter...
Tianyi Wu, Yizhou Sun, Cuiping Li, Jiawei Han
EDBT
2010
ACM
246views Database» more  EDBT 2010»
14 years 5 months ago
Fast computation of SimRank for static and dynamic information networks
Information networks are ubiquitous in many applications and analysis on such networks has attracted significant attention in the academic communities. One of the most important ...
Cuiping Li, Jiawei Han, Guoming He, Xin Jin, Yizho...
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
14 years 5 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 5 months ago
Support Multi-version Applications in SaaS via Progressive Schema Evolution
— Update of applications in SaaS is expected to be a continuous efforts and cannot be done overnight or over the weekend. In such migration efforts, users are trained and shifted...
Jianfeng Yan, Bo Zhang
SAC
2009
ACM
14 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
« Prev « First page 2816 / 2878 Last » Next »