Sciweavers

172 search results - page 20 / 35
» tkde 2008
Sort
View
TKDE
2010
151views more  TKDE 2010»
13 years 8 months ago
Duplicate-Insensitive Order Statistics Computation over Data Streams
—Duplicates in data streams may often be observed by the projection on a subspace and/or multiple recordings of objects. Without the uniqueness assumption on observed data elemen...
Ying Zhang, Xuemin Lin, Yidong Yuan, Masaru Kitsur...
TKDE
2010
199views more  TKDE 2010»
13 years 8 months ago
Probabilistic Reverse Nearest Neighbor Queries on Uncertain Data
—Uncertain data is inherent in various important applications and reverse nearest neighbor (RNN) query is an important query type for many applications. While many different type...
Muhammad Aamir Cheema, Xuemin Lin, Wei Wang 0011, ...
TKDE
2010
272views more  TKDE 2010»
13 years 8 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
TKDE
2010
185views more  TKDE 2010»
13 years 8 months ago
Superseding Nearest Neighbor Search on Uncertain Spatial Databases
This paper proposes a new problem, called superseding nearest neighbor search, on uncertain spatial databases, where each object is described by a multidimensional probability den...
Sze Man Yuen, Yufei Tao, Xiaokui Xiao, Jian Pei, D...
TKDE
2010
229views more  TKDE 2010»
13 years 8 months ago
Deriving Concept-Based User Profiles from Search Engine Logs
—User profiling is a fundamental component of any personalization applications. Most existing user profiling strategies are based on objects that users are interested in (i.e., p...
Kenneth Wai-Ting Leung, Dik Lun Lee