Sciweavers

1457 search results - page 232 / 292
» Privacy Challenges for Database Systems
Sort
View
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
14 years 11 months ago
Query Planning with Limited Source Capabilities
In information-integration systems, sources may have diverse and limited query capabilities. In this paper we show that because sources have restrictions on retrieving their infor...
Chen Li, Edward Y. Chang
VLDB
2001
ACM
151views Database» more  VLDB 2001»
14 years 10 months ago
Approximate query mapping: Accounting for translation closeness
Abstract In this paper we present a mechanism for approximately translating Boolean query constraints across heterogeneous information sources. Achieving the best translation is ch...
Kevin Chen-Chuan Chang, Hector Garcia-Molina
VLDB
2007
ACM
174views Database» more  VLDB 2007»
14 years 10 months ago
An adaptive and dynamic dimensionality reduction method for high-dimensional indexing
Abstract The notorious "dimensionality curse" is a wellknown phenomenon for any multi-dimensional indexes attempting to scale up to high dimensions. One well-known approa...
Heng Tao Shen, Xiaofang Zhou, Aoying Zhou
SIGMOD
2006
ACM
110views Database» more  SIGMOD 2006»
14 years 10 months ago
Supporting ad-hoc ranking aggregates
This paper presents a principled framework for efficient processing of ad-hoc top-k (ranking) aggregate queries, which provide the k groups with the highest aggregates as results....
Chengkai Li, Kevin Chen-Chuan Chang, Ihab F. Ilyas
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 10 months ago
A geometric approach to monitoring threshold functions over distributed data streams
Monitoring data streams in a distributed system is the focus of much research in recent years. Most of the proposed schemes, however, deal with monitoring simple aggregated values...
Izchak Sharfman, Assaf Schuster, Daniel Keren