Sciweavers

43 search results - page 4 / 9
» Authenticated Index Structures for Aggregation Queries
Sort
View
SSDBM
2009
IEEE
149views Database» more  SSDBM 2009»
14 years 2 months ago
Reverse k-Nearest Neighbor Search Based on Aggregate Point Access Methods
Abstract. We propose an original solution for the general reverse k-nearest neighbor (RkNN) search problem in Euclidean spaces. Compared to the limitations of existing methods for ...
Hans-Peter Kriegel, Peer Kröger, Matthias Ren...
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 6 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 7 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
GIS
2005
ACM
14 years 8 months ago
Improving the R*-tree with outlier handling techniques
The R*-tree, as a state-of-the-art spatial index, has already found its way into commercial systems like Oracle. In this paper, we aim at improving query performance of the R*tree...
Tian Xia, Donghui Zhang
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
14 years 9 months ago
Spatial Outsourcing for Location-based Services
- The embedding of positioning capabilities in mobile devices and the emergence of location-based applications have created novel opportunities for utilizing several types of multi...
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...