Sciweavers

ICDE
2005
IEEE
100views Database» more  ICDE 2005»
15 years 27 days ago
The XML Stream Query Processor SPEX
François Bry, Fatih Coskun, Serap Durmaz, T...
ICDE
2005
IEEE
111views Database» more  ICDE 2005»
15 years 27 days ago
Schema Matching using Duplicates
Most data integration applications require a matching between the schemas of the respective data sets. We show how the existence of duplicates within these data sets can be exploi...
Alexander Bilke, Felix Naumann
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
15 years 27 days ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
ICDE
2005
IEEE
121views Database» more  ICDE 2005»
15 years 27 days ago
Full-fledged Algebraic XPath Processing in Natix
We present the first complete translation of XPath into an algebra, paving the way for a comprehensive, state-of-theart XPath (and later on, XQuery) compiler based on algebraic op...
Matthias Brantner, Sven Helmer, Carl-Christian Kan...
ICDE
2005
IEEE
104views Database» more  ICDE 2005»
15 years 27 days ago
Practical Data Management Techniques for Vehicle Tracking Data
A novel data source for assessing traffic conditions is floating car data (FCD) in the form of vehicle tracking data, or, in database terms, trajectory data. This work proposes pr...
Sotiris Brakatsoulas, Dieter Pfoser, Nectaria Tryf...
ICDE
2005
IEEE
93views Database» more  ICDE 2005»
15 years 27 days ago
Fuzzy Spatial Objects: An Algebra Implementation in SECONDO
Thomas Behr, Ralf Hartmut Güting
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
15 years 27 days ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
15 years 27 days ago
Database Architectures for New Hardware
Anastassia Ailamaki
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
15 years 27 days ago
A Framework for High-Accuracy Privacy-Preserving Mining
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, ...
Shipra Agrawal, Jayant R. Haritsa
ICDE
2005
IEEE
137views Database» more  ICDE 2005»
15 years 27 days ago
Extending Relational Database Systems to Automatically Enforce Privacy Policies
Databases are at the core of successful businesses. Due to the voluminous stores of personal data being held by companies today, preserving privacy has become a crucial requiremen...
Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry...