The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
Abstract. Fine-grained lock protocols with lock modes and lock granules adjusted to the various XML processing models, allow for highly concurrent transaction processing on XML tre...
Abstract. The suppression scheme is a solution for limited energy constraints in sensor networks. Temporal suppression, spatial suppression and spatio-temporal suppression are prop...
Abstract. In this paper, we demonstrate an effective ranked XML keyword search with meaningful result display. Our system, named ICRA, recognizes a set of object classes in XML dat...
Abstract. In this tutorial we provide an insight into Web Mining, i.e., discovering knowledge from the World Wide Web, especially with reference to the latest developments in Web t...
Aparna S. Varde, Fabian M. Suchanek, Richi Nayak, ...
Abstract. Query expansion has received extensive attention in information retrieval community. Although semantic based query expansion appears to be promising in improving retrieva...
We investigate the expressiveness of existing XML keyword search semantics and propose Meaningful Connected Network (MCN) as a new semantics to capture meaningful relationships of ...
Junfeng Zhou, Zhifeng Bao, Tok Wang Ling, Xiaofeng...
Wireless Multimedia Sensor Networks (WMSNs) have brought unprecedented potentials for applications requiring ubiquitous access to multimedia contents such as still images. However,...
Graph-structured databases and related problems such as reachability query processing have been increasingly relevant to many applications such as XML databases, biological databas...