Sciweavers

TKDE
2010
272views more  TKDE 2010»
13 years 9 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
TKDE
2010
199views more  TKDE 2010»
13 years 9 months ago
Probabilistic Reverse Nearest Neighbor Queries on Uncertain Data
—Uncertain data is inherent in various important applications and reverse nearest neighbor (RNN) query is an important query type for many applications. While many different type...
Muhammad Aamir Cheema, Xuemin Lin, Wei Wang 0011, ...
TKDE
2010
135views more  TKDE 2010»
13 years 9 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
TKDE
2010
274views more  TKDE 2010»
13 years 9 months ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002
TKDE
2010
159views more  TKDE 2010»
13 years 9 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
TKDE
2010
148views more  TKDE 2010»
13 years 9 months ago
False Negative Problem of Counting Bloom Filter
—Bloom filter is effective, space-efficient data structure for concisely representing a data set and supporting approximate membership queries. Traditionally, researchers often b...
Deke Guo, Yunhao Liu, Xiang-Yang Li, Panlong Yang
TKDE
2010
116views more  TKDE 2010»
13 years 9 months ago
k-Anonymity in the Presence of External Databases
Dimitris Sacharidis, Kyriakos Mouratidis, Dimitris...
TKDE
2010
151views more  TKDE 2010»
13 years 9 months ago
Duplicate-Insensitive Order Statistics Computation over Data Streams
—Duplicates in data streams may often be observed by the projection on a subspace and/or multiple recordings of objects. Without the uniqueness assumption on observed data elemen...
Ying Zhang, Xuemin Lin, Yidong Yuan, Masaru Kitsur...
TKDE
2010
210views more  TKDE 2010»
13 years 9 months ago
Structural and Role-Oriented Web Service Discovery with Taxonomies in OWL-S
—In this paper, we describe and evaluate a Web service discovery framework using OWL-S advertisements, combined with the distinction between service and Web service of the WSMO D...
Georgios Meditskos, Nick Bassiliades
TKDE
2010
153views more  TKDE 2010»
13 years 9 months ago
Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation
—“Ontology matching” is the process of finding correspondences between entities belonging to different ontologies. This paper describes a set of algorithms that exploit uppe...
Viviana Mascardi, Angela Locoro, Paolo Rosso