Sciweavers

2853 search results - page 20 / 571
» On the Efficiency of Provenance Queries
Sort
View
PODS
2006
ACM
121views Database» more  PODS 2006»
14 years 8 months ago
On the efficiency of checking perfect privacy
Privacy-preserving query-answering systems answer queries while provably guaranteeing that sensitive information is kept secret. One very attractive notion of privacy is perfect p...
Ashwin Machanavajjhala, Johannes Gehrke
DASFAA
2009
IEEE
147views Database» more  DASFAA 2009»
14 years 3 months ago
"Pay-as-You-Go" Processing for Tracing Queries in a P2P Record Exchange System
In recent years, data provenance or lineage tracing which refers to the process of tracing the sources of data, data movement between databases, and annotations written for data ha...
Fengrong Li, Takuya Iida, Yoshiharu Ishikawa
ICDE
2005
IEEE
105views Database» more  ICDE 2005»
14 years 9 months ago
Representing and Querying Data Transformations
Modern information systems often store data that has been transformed and integrated from a variety of sources. This integration may obscure the original source semantics of data ...
John Mylopoulos, Renée J. Miller, Yannis Ve...
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
14 years 9 months ago
Query Planning with Limited Source Capabilities
In information-integration systems, sources may have diverse and limited query capabilities. In this paper we show that because sources have restrictions on retrieving their infor...
Chen Li, Edward Y. Chang
SIGIR
2010
ACM
13 years 8 months ago
Learning to rank query reformulations
Query reformulation techniques based on query logs have recently proven to be effective for web queries. However, when initial queries have reasonably good quality, these techniqu...
Van Dang, Michael Bendersky, W. Bruce Croft