Sciweavers

1091 search results - page 86 / 219
» Approximation in Databases
Sort
View
229
Voted
ICDE
2006
IEEE
178views Database» more  ICDE 2006»
16 years 3 months ago
Characterizing and Exploiting Reference Locality in Data Stream Applications
In this paper, we investigate a new approach to process queries in data stream applications. We show that reference locality characteristics of data streams could be exploited in ...
Feifei Li, Ching Chang, George Kollios, Azer Besta...
SIGMOD
2011
ACM
247views Database» more  SIGMOD 2011»
14 years 5 months ago
Collective spatial keyword querying
With the proliferation of geo-positioning and geo-tagging, spatial web objects that possess both a geographical location and a textual description are gaining in prevalence, and s...
Xin Cao, Gao Cong, Christian S. Jensen, Beng Chin ...
93
Voted
PODS
2004
ACM
109views Database» more  PODS 2004»
16 years 2 months ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams
239
Voted
ICDE
2002
IEEE
206views Database» more  ICDE 2002»
16 years 3 months ago
Exploiting Local Similarity for Indexing Paths in Graph-Structured Data
XML and other semi-structured data may have partially specified or missing schema information, motivating the use of a structural summary which can be automatically computed from ...
Raghav Kaushik, Pradeep Shenoy, Philip Bohannon, E...
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
16 years 2 months ago
Wavelet synopses with error guarantees
Recent work has demonstrated the effectiveness of the wavelet decomposition in reducing large amounts of data to compact sets of wavelet coefficients (termed "wavelet synopse...
Minos N. Garofalakis, Phillip B. Gibbons