Sciweavers

651 search results - page 42 / 131
» Negative Database for Data Security
Sort
View
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
14 years 8 months ago
Time series shapelets: a new primitive for data mining
Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm ...
Lexiang Ye, Eamonn J. Keogh
SSDBM
2007
IEEE
212views Database» more  SSDBM 2007»
14 years 2 months ago
Adaptive-Size Reservoir Sampling over Data Streams
Reservoir sampling is a well-known technique for sequential random sampling over data streams. Conventional reservoir sampling assumes a fixed-size reservoir. There are situation...
Mohammed Al-Kateb, Byung Suk Lee, Xiaoyang Sean Wa...
SDMW
2010
Springer
13 years 6 months ago
Joining Privately on Outsourced Data
In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients ar...
Bogdan Carbunar, Radu Sion
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 2 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
ER
1999
Springer
155views Database» more  ER 1999»
14 years 2 days ago
Detecting Redundancy in Data Warehouse Evolution
A Data Warehouse DW can be abstractly seen as a set of materialized views de ned over a set of remote data sources. A DW is intended to satisfy a set of queries. The views materi...
Dimitri Theodoratos