Sciweavers

154 search results - page 9 / 31
» Verifying Completeness of Relational Query Results in Data P...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
14 years 2 months ago
Automated generation of object summaries from relational databases: A novel keyword searching paradigm
— This paper introduces a novel keyword searching paradigm in Relational Databases (DBs), where the result of a search is a ranked set of Object Summaries (OSs). An OS summarizes...
Georgios John Fakas
DASFAA
2003
IEEE
146views Database» more  DASFAA 2003»
14 years 27 days ago
Cost-Driven Storage Schema Selection for XML
Various models and approaches have been proposed for mapping XML data into relational tables recently. Most of those approaches produce relational schema for given XML data, based...
Shihui Zheng, Ji-Rong Wen, Hongjun Lu
CIKM
2006
Springer
13 years 11 months ago
Efficient join processing over uncertain data
In an uncertain database, each data item is modeled as a range associated with a probability density function. Previous works for this kind of data have focussed on simple queries...
Reynold Cheng, Sarvjeet Singh, Sunil Prabhakar, Ra...
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 1 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch