Sciweavers

1125 search results - page 199 / 225
» Query Answering in Inconsistent Databases
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
PODS
2005
ACM
164views Database» more  PODS 2005»
14 years 9 months ago
Lower bounds for sorting with few random accesses to external memory
We consider a scenario where we want to query a large dataset that is stored in external memory and does not fit into main memory. The most constrained resources in such a situati...
Martin Grohe, Nicole Schweikardt
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
12 years 2 days ago
Differentially Private Spatial Decompositions
— Differential privacy has recently emerged as the de facto standard for private data release. This makes it possible to provide strong theoretical guarantees on the privacy and ...
Graham Cormode, Cecilia M. Procopiuc, Divesh Sriva...
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
14 years 3 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
ATAL
2007
Springer
14 years 1 months ago
Negotiation by abduction and relaxation
This paper studies a logical framework for automated negotiation between two agents. We suppose an agent who has a knowledge base represented by a logic program. Then, we introduc...
Chiaki Sakama, Katsumi Inoue