Sciweavers

833 search results - page 95 / 167
» Wallet Databases with Observers
Sort
View
SIGMOD
2006
ACM
141views Database» more  SIGMOD 2006»
14 years 10 months ago
Contour map matching for event detection in sensor networks
Many sensor network applications, such as object tracking and disaster monitoring, require effective techniques for event detection. In this paper, we propose a novel event detect...
Wenwei Xue, Qiong Luo, Lei Chen 0002, Yunhao Liu
SIGMOD
2005
ACM
144views Database» more  SIGMOD 2005»
14 years 10 months ago
Mining Periodic Patterns with Gap Requirement from Sequences
We study a problem of mining frequently occurring periodic patterns with a gap requirement from sequences. Given a character sequence S of length L and a pattern P of length l, we...
Minghua Zhang, Ben Kao, David Wai-Lok Cheung, Kevi...
PODS
2004
ACM
98views Database» more  PODS 2004»
14 years 10 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher
EDBT
2004
ACM
155views Database» more  EDBT 2004»
14 years 10 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher
EDBT
2006
ACM
118views Database» more  EDBT 2006»
14 years 10 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi