Sciweavers

ICDE
2006
IEEE
134views Database» more  ICDE 2006»
14 years 1 months ago
Processing High-Volume Stream Queries on a Supercomputer
Scientific instruments, such as radio telescopes, colliders, sensor networks, and simulators generate very high volumes of data streams that scientists analyze to detect and under...
Erik Zeitler, Tore Risch
ICDE
2006
IEEE
225views Database» more  ICDE 2006»
14 years 1 months ago
Continuous Reverse Nearest Neighbor Monitoring
Continuous spatio-temporal queries have recently received increasing attention due to the abundance of location-aware applications. This paper addresses the Continuous Reverse Nea...
Tian Xia, Donghui Zhang
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
14 years 1 months ago
E - A Generic Event Model for Event-Centric Multimedia Data Management in eChronicle Applications
eChronicle applications are inherently event-centric, enabling users to find and explore important events in an application domain and providing unified access to any media that...
Utz Westermann, Ramesh Jain
ICDE
2006
IEEE
127views Database» more  ICDE 2006»
14 years 1 months ago
Processing Recursive XQuery over XML Streams: The Raindrop Approach
— XML stream applications bring the challenge of efficiently processing queries on sequentially accessible tokenbased data. For efficient processing of queries, we need to ensu...
Mingzhu Wei, Ming Li, Elke A. Rundensteiner, Mural...
ICDE
2006
IEEE
146views Database» more  ICDE 2006»
14 years 1 months ago
Model Video Semantics with Constraints Considering Temporal Structure and Typed Events
The advances of video technology and video-related applications demand appropriate video semantic models for representing video data and their semantics, and supporting powerful s...
Yu Wang, Lizhu Zhou, Jianyong Wang
ICDE
2006
IEEE
122views Database» more  ICDE 2006»
14 years 1 months ago
Searching Local Information in Mobile Databases
Ouri Wolfson, Bo Xu, Huabei Yin, Hu Cao
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
14 years 1 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
14 years 1 months ago
Dealing with Overload in Distributed Stream Processing Systems
Overload management has been an important problem for large-scale dynamic systems. In this paper, we study this problem in the context of our Borealis distributed stream processin...
Nesime Tatbul, Stanley B. Zdonik
ICDE
2006
IEEE
154views Database» more  ICDE 2006»
14 years 1 months ago
Ontology-Driven Semantic Matches between Database Schemas
Schema matching has been historically difficult to automate. Most previous studies have tried to find matches by exploiting information on schema and data instances. However, sche...
Sangsoo Sung, Dennis McLeod
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
14 years 1 months ago
Finding Thai Web Pages in Foreign Web Spaces
While the Web has been increasingly recognized as a culturally valuable social artifact, many nations endeavor to create national Web archives for long term preservation. However, ...
Kulwadee Somboonviwat, Takayuki Tamura, Masaru Kit...