Sciweavers

ICDE
2009
IEEE
168views Database» more  ICDE 2009»
15 years 2 months ago
Privacy-Preserving Singular Value Decomposition
Abstract-- In this paper, we propose secure protocols to perform Singular Value Decomposition (SVD) for two parties over horizontally and vertically partitioned data. We propose va...
Shuguo Han, Wee Keong Ng, Philip S. Yu
ICDE
2009
IEEE
136views Database» more  ICDE 2009»
15 years 2 months ago
A Concise Representation of Range Queries
Abstract--With the advance of wireless communication technology, it is quite common for people to view maps or get related services from the handheld devices, such as mobile phones...
Ke Yi, Xiang Lian, Feifei Li, Lei Chen 0002
ICDE
2009
IEEE
115views Database» more  ICDE 2009»
15 years 2 months ago
X-CSR: Dataflow Optimization for Distributed XML Process Pipelines
Bertram Ludäscher, Daniel Zinn, Shawn Bowers,...
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
15 years 2 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi
ICDE
2009
IEEE
171views Database» more  ICDE 2009»
15 years 2 months ago
A Framework for Clustering Massive-Domain Data Streams
In this paper, we will examine the problem of clustering massive domain data streams. Massive-domain data streams are those in which the number of possible domain values for each a...
Charu C. Aggarwal
ICDE
2009
IEEE
149views Database» more  ICDE 2009»
15 years 2 months ago
OPAQUE: Protecting Path Privacy in Directions Search
Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus r...
Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baih...
ICDE
2009
IEEE
169views Database» more  ICDE 2009»
15 years 2 months ago
Visible Reverse k-Nearest Neighbor Queries
Reverse nearest neighbor (RNN) queries have a broad application base such as decision support, profile-based marketing, resource allocation, data mining, etc. Previous work on RNN ...
Yunjun Gao, Baihua Zheng, Gencai Chen, Wang-Chien ...
ICDE
2009
IEEE
179views Database» more  ICDE 2009»
15 years 2 months ago
Flexible Recommendations for Course Planning
Most recommendation methods are `hard-wired' into the system and they support only fixed recommendations. The purpose of this demo is to show the expressivity of flexible reco...
Georgia Koutrika, Benjamin Bercovitz, Robert Ikeda...
ICDE
2009
IEEE
181views Database» more  ICDE 2009»
15 years 2 months ago
BP-Wrapper: A System Framework Making Any Replacement Algorithms (Almost) Lock Contention Free
Abstract-- In a high-end database system, the execution concurrency level rises continuously in a multiprocessor environment due to the increase in number of concurrent transaction...
Xiaoning Ding, Song Jiang, Xiaodong Zhang
ICDE
2009
IEEE
115views Database» more  ICDE 2009»
15 years 2 months ago
Efficient Evaluation of Multiple Preference Queries
Consider multiple users searching for a hotel room, based on size, cost, distance to the beach, etc. Users may have variable preferences expressed by different weights on the attri...
Leong Hou U, Nikos Mamoulis, Kyriakos Mouratidis