Sciweavers

VLDB
2008
ACM
90views Database» more  VLDB 2008»
14 years 11 months ago
Enabling Schema-Free XQuery with meaningful query focus
Yunyao Li, Cong Yu, H. V. Jagadish
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 11 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
VLDB
2008
ACM
127views Database» more  VLDB 2008»
14 years 11 months ago
Delay aware querying with Seaweed
Large highly distributed data sets are poorly supported by current query technologies. Applications such as endsystembased network management are characterized by data stored on l...
Dushyanth Narayanan, Austin Donnelly, Richard Mort...
VLDB
2007
ACM
114views Database» more  VLDB 2007»
14 years 11 months ago
Optimization and evaluation of shortest path queries
We investigate the problem of how to evaluate efficiently a collection of shortest path queries on massive graphs that are too big to fit in the main memory. To evaluate a shortes...
Edward P. F. Chan, Heechul Lim
VLDB
2007
ACM
131views Database» more  VLDB 2007»
14 years 11 months ago
Dissemination of compressed historical information in sensor networks
Sensor nodes are small devices that "measure" their environment and communicate feeds of low-level data values to a base station for further processing and archiving. Dis...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
VLDB
2007
ACM
191views Database» more  VLDB 2007»
14 years 11 months ago
Multidimensional reverse k NN search
Given a multidimensional point q, a reverse k nearest neighbor (RkNN) query retrieves all the data points that have q as one of their k nearest neighbors. Existing methods for proc...
Yufei Tao, Dimitris Papadias, Xiang Lian, Xiaokui ...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 11 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
VLDB
2007
ACM
99views Database» more  VLDB 2007»
14 years 11 months ago
The dynamic predicate: integrating access control with query processing in XML databases
Jae-Gil Lee, Kyu-Young Whang, Wook-Shin Han, Il-Ye...
VLDB
2007
ACM
151views Database» more  VLDB 2007»
14 years 11 months ago
Consistent selectivity estimation via maximum entropy
Volker Markl, Peter J. Haas, Marcel Kutsch, Nimrod...