Sciweavers

19 search results - page 4 / 4
» ssdbm 2007
Sort
View
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 1 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
SSDBM
2007
IEEE
212views Database» more  SSDBM 2007»
14 years 1 months ago
Adaptive-Size Reservoir Sampling over Data Streams
Reservoir sampling is a well-known technique for sequential random sampling over data streams. Conventional reservoir sampling assumes a fixed-size reservoir. There are situation...
Mohammed Al-Kateb, Byung Suk Lee, Xiaoyang Sean Wa...
SSDBM
2007
IEEE
127views Database» more  SSDBM 2007»
14 years 1 months ago
Update Conscious Bitmap Indices
Bitmap indices have been widely used in several domains such as data warehousing and scientific applications due to their efficiency in answering certain query types over large ...
Guadalupe Canahuate, Michael Gibas, Hakan Ferhatos...
SSDBM
2007
IEEE
165views Database» more  SSDBM 2007»
14 years 1 months ago
Processing Spatial-Keyword (SK) Queries in Geographic Information Retrieval (GIR) Systems
Location-based information contained in publicly available GIS databases is invaluable for many applications such as disaster response, national infrastructure protection, crime a...
Ramaswamy Hariharan, Bijit Hore, Chen Li, Sharad M...