In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Mapping composition is a fundamental operation in metadata driven applications. Given a mapping over schemas 1 and 2 and a mapping over schemas 2 and 3, the composition problem is...
Philip A. Bernstein, Todd J. Green, Sergey Melnik,...
Abstract Sensor devices produce data that are unreliable, low-level, and seldom able to be used directly by applications. In this paper, we propose Metaphysical Data Independence (...
Shawn R. Jeffery, Michael J. Franklin, Minos N. Ga...
The existing predictive spatiotemporal indexes can be classified into two categories, depending on whether they are based on the primal or dual methodology. Although we have gaine...