Sciweavers

152 search results - page 12 / 31
» In time alone: on the computational power of querying the hi...
Sort
View
SIGMOD
2010
ACM
132views Database» more  SIGMOD 2010»
13 years 3 months ago
Durable top-k search in document archives
We propose and study a new ranking problem in versioned databases. Consider a database of versioned objects which have different valid instances along a history (e.g., documents i...
Leong Hou U, Nikos Mamoulis, Klaus Berberich, Srik...
TVCG
2008
103views more  TVCG 2008»
13 years 8 months ago
Who Votes For What? A Visual Query Language for Opinion Data
Surveys and opinion polls are extremely popular in the media, especially in the months preceding a general election. However, the available tools for analyzing poll results often r...
Geoffrey M. Draper, Richard F. Riesenfeld
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
14 years 8 months ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
DASFAA
2007
IEEE
150views Database» more  DASFAA 2007»
14 years 3 months ago
TinTO: A Tool for the View-Based Analysis of Streams of Stock Market Data
TinTO is an experimental system aiming at demonstrating the usefulness and feasibility of applying conventional SQL queries for analyzing a wide spectrum of data streams. As applic...
Andreas Behrend, Christian Dorau, Rainer Manthey
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 3 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall