Sciweavers

SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 12 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
SIGMOD
2009
ACM
167views Database» more  SIGMOD 2009»
14 years 12 months ago
Exploring schema repositories with schemr
Schemr is a schema search engine, and provides users the ability to search for and visualize schemas stored in a metadata repository. Users may search by keywords and by example ?...
Kuang Chen, Jayant Madhavan, Alon Y. Halevy
SIGMOD
2009
ACM
235views Database» more  SIGMOD 2009»
14 years 12 months ago
Quality and efficiency in high dimensional nearest neighbor search
Nearest neighbor (NN) search in high dimensional space is an important problem in many applications. Ideally, a practical solution (i) should be implementable in a relational data...
Yufei Tao, Ke Yi, Cheng Sheng, Panos Kalnis
SIGMOD
2009
ACM
132views Database» more  SIGMOD 2009»
14 years 12 months ago
Generating example data for dataflow programs
Christopher Olston, Shubham Chopra, Utkarsh Srivas...
SIGMOD
2009
ACM
219views Database» more  SIGMOD 2009»
14 years 12 months ago
Hermes: a travel through semantics on the data web
The Web as a global information space is developing from a Web of documents to a Web of data. This development opens new ways for addressing complex information needs. Search is n...
Haofen Wang, Thomas Penin, Kaifeng Xu, Junquan Che...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 12 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
14 years 12 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
14 years 12 months ago
GAMPS: compressing multi sensor data by grouping and amplitude scaling
We consider the problem of collectively approximating a set of sensor signals using the least amount of space so that any individual signal can be efficiently reconstructed within...
Sorabh Gandhi, Suman Nath, Subhash Suri, Jie Liu
SIGMOD
2009
ACM
132views Database» more  SIGMOD 2009»
14 years 12 months ago
Core schema mappings
Research has investigated mappings among data sources under two perspectives. On one side, there are studies of practical tools for schema mapping generation; these focus on algor...
Giansalvatore Mecca, Paolo Papotti, Salvatore Raun...
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
14 years 12 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden