Sciweavers

251 search results - page 33 / 51
» MindReader: Querying Databases Through Multiple Examples
Sort
View
INFORMATICASI
2010
13 years 7 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
PODS
2004
ACM
207views Database» more  PODS 2004»
14 years 10 months ago
Adaptive Sampling for Geometric Problems over Data Streams
Geometric coordinates are an integral part of many data streams. Examples include sensor locations in environmental monitoring, vehicle locations in traffic monitoring or battlefi...
John Hershberger, Subhash Suri
ISSA
2004
13 years 11 months ago
On Privacy And The Web
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
Wesley Brandi
VLDB
1994
ACM
149views Database» more  VLDB 1994»
14 years 1 months ago
Qualified Answers That Reflect User Needs and Preferences
This paper introduces a formalism to describe the needs and preferences of database users. Because of the precise formulation of these concepts, we have found an automatic and ver...
Terry Gaasterland, Jorge Lobo
CIKM
2008
Springer
13 years 11 months ago
Transaction reordering with application to synchronized scans
Traditional workload management methods mainly focus on the current system status while information about the interaction between queued and running transactions is largely ignore...
Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, Mi...