Sciweavers

DASFAA
2009
IEEE
108views Database» more  DASFAA 2009»
13 years 11 months ago
An Effective and Efficient Method for Handling Transmission Failures in Sensor Networks
Abstract. The suppression scheme is a solution for limited energy constraints in sensor networks. Temporal suppression, spatial suppression and spatio-temporal suppression are prop...
Heejung Yang, Chin-Wan Chung
SIGMOD
2010
ACM
259views Database» more  SIGMOD 2010»
13 years 11 months ago
An extensible test framework for the Microsoft StreamInsight query processor
Microsoft StreamInsight (StreamInsight, for brevity) is a platform for developing and deploying streaming applications. StreamInsight adopts a deterministic stream model that leve...
Alex Raizman, Asvin Ananthanarayan, Anton Kirilov,...
DEXAW
2007
IEEE
120views Database» more  DEXAW 2007»
13 years 11 months ago
Clustering Genetic Algorithm
Petra Kudová
ICDT
2007
ACM
143views Database» more  ICDT 2007»
13 years 11 months ago
Hierarchical Summarizing and Evaluating for Web Pages
In this investigation we propose a novel summarization method of Web pages using hierarchical expression. We discuss close relationship between summarization and hierarchical clust...
Kou Takahashi, Takao Miura, Isamu Shioya
ICDT
2007
ACM
118views Database» more  ICDT 2007»
13 years 11 months ago
Approximate Data Exchange
Abstract. We introduce approximate data exchange, by relaxing classical data exchange problems such as Consistency and Typechecking to their approximate versions based on Property ...
Michel de Rougemont, Adrien Vieilleribière
ICDT
2007
ACM
105views Database» more  ICDT 2007»
13 years 11 months ago
Unlocking Keys for XML Trees
Abstract. We review key constraints in the context of XML as introduced by Buneman et al. We show that one of the proposed inference rules is not sound in general, and the axiomati...
Sven Hartmann, Sebastian Link
ICDT
2007
ACM
74views Database» more  ICDT 2007»
13 years 11 months ago
World-Set Decompositions: Expressiveness and Efficient Algorithms
Uncertain information is commonplace in real-world data management scenarios. The ability to represent large sets of possible instances (worlds) while supporting efficient storage ...
Lyublena Antova, Christoph Koch, Dan Olteanu
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
13 years 11 months ago
Group Recommending: A methodological Approach based on Bayesian Networks
The problem of building Recommender Systems has attracted considerable attention in recent years, but most recommender systems are designed for recommending items for individuals....
Luis M. de Campos, Juan M. Fernández-Luna, ...
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
13 years 11 months ago
Realizing Privacy-Preserving Features in Hippocratic Databases
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Yasin Laura-Silva, Walid G. Aref
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
13 years 11 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego