Sciweavers

ICDE
2007
IEEE
146views Database» more  ICDE 2007»
14 years 3 months ago
Index-based Most Similar Trajectory Search
The problem of trajectory similarity in moving object databases is a relatively new topic in the spatial and spatiotemporal database literature. Existing work focuses on the spati...
Elias Frentzos, Kostas Gratsias, Yannis Theodoridi...
ER
2009
Springer
316views Database» more  ER 2009»
14 years 3 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 3 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
EDBT
2009
ACM
100views Database» more  EDBT 2009»
14 years 3 months ago
Efficiently indexing shortest paths by exploiting symmetry in graphs
Yanghua Xiao, Wentao Wu, Jian Pei, Wei Wang 0009, ...
EDBT
2009
ACM
122views Database» more  EDBT 2009»
14 years 3 months ago
Finding the influence set through skylines
Given a set P of products, a set O of customers, and a product p P, a bichromatic reverse skyline query retrieves all the customers in O that do not find any other product in P t...
Xiaobing Wu, Yufei Tao, Raymond Chi-Wing Wong, Lin...
EDBT
2009
ACM
170views Database» more  EDBT 2009»
14 years 3 months ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman
EDBT
2009
ACM
164views Database» more  EDBT 2009»
14 years 3 months ago
Efficient identification of starters and followers in social media
Activity and user engagement in social media such as web logs, wikis, online forums or social networks has been increasing at unprecedented rates. In relation to social behavior i...
Michael Mathioudakis, Nick Koudas
EDBT
2009
ACM
148views Database» more  EDBT 2009»
14 years 3 months ago
MVT: a schema mapping validation tool
Schema mappings define relationships between schemas in a declarative way. We demonstrate MVT, a mapping validation tool that allows the designer to ask whether the mapping has ce...
Guillem Rull, Carles Farré, Ernest Teniente...
EDBT
2009
ACM
128views Database» more  EDBT 2009»
14 years 3 months ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu
EDBT
2009
ACM
92views Database» more  EDBT 2009»
14 years 3 months ago
Efficient skyline computation in metric space
Given a set of n query points in a general metric space, a metricspace skyline (MSS) query asks what are the closest points to all these query points in the database. Here, consid...
David Fuhry, Ruoming Jin, Donghui Zhang