Sciweavers

VLDB
2010
ACM
214views Database» more  VLDB 2010»
13 years 5 months ago
Privacy policies for shared content in social network sites
Anna Cinzia Squicciarini, Mohamed Shehab, Joshua W...
VLDB
2010
ACM
95views Database» more  VLDB 2010»
13 years 5 months ago
Multimodal social intelligence in a real-time dashboard system
Daniel Gruhl, Meenakshi Nagarajan, Jan Pieper, Chr...
VLDB
2010
ACM
127views Database» more  VLDB 2010»
13 years 5 months ago
Structural consistency: enabling XML keyword search to eliminate spurious results consistently
Ki-Hoon Lee, Kyu-Young Whang, Wook-Shin Han, Min-S...
VLDB
2010
ACM
227views Database» more  VLDB 2010»
13 years 9 months ago
Supporting ranking queries on uncertain and incomplete data
Mohamed A. Soliman, Ihab F. Ilyas, Shalev Ben-Davi...
VLDB
2010
ACM
155views Database» more  VLDB 2010»
13 years 9 months ago
Top-k queries on temporal data
Feifei Li, Ke Yi, Wangchao Le
VLDB
2010
ACM
137views Database» more  VLDB 2010»
13 years 9 months ago
Path prediction and predictive range querying in road network databases
Hoyoung Jeung, Man Lung Yiu, Xiaofang Zhou, Christ...
VLDB
2010
ACM
192views Database» more  VLDB 2010»
13 years 9 months ago
Enabling search services on outsourced private spatial data
Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen...
VLDB
2010
ACM
96views Database» more  VLDB 2010»
13 years 9 months ago
Threshold-based probabilistic top-k dominating queries
Wenjie Zhang, Xuemin Lin, Ying Zhang, Jian Pei, We...
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 9 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VLDB
2010
ACM
147views Database» more  VLDB 2010»
13 years 9 months ago
A framework for testing DBMS features
Eric Lo, Carsten Binnig, Donald Kossmann, M. Tamer...