• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,134
Next 10 →

Statistical Databases: Query Restriction

by Nina Mishra , 2004
"... Introduction A statistical database typically contains information about n individuals where n is very large. A statistical database system gives users the ability to both obtain statistical information (like average, median, count) and preserve the privacy of any individual. Examples include census ..."
Abstract - Add to MetaCart
Introduction A statistical database typically contains information about n individuals where n is very large. A statistical database system gives users the ability to both obtain statistical information (like average, median, count) and preserve the privacy of any individual. Examples include census and medical databases.

Querying Heterogeneous Information Sources Using Source Descriptions

by Alon Levy, Anand Rajaraman, Joann Ordille , 1996
"... We witness a rapid increase in the number of structured information sources that are available online, especially on the WWW. These sources include commercial databases on product information, stock market information, real estate, automobiles, and entertainment. We would like to use the data stored ..."
Abstract - Cited by 724 (34 self) - Add to MetaCart
-featured database systems and can answer only a small set of queries over their data (for example, forms on the WWW restrict the set of queries one can ask). (3) Since the number of sources is very large, effective techniques are needed to prune the set of information sources accessed to answer a query. (4

Reliability Based Query Restriction: Discovering Stable Routes

by Vartika Bhandari, Nupur Kothari, Dheeraj Sanghi
"... Ad hoc networks with high mobility profiles suffer from the problem of repeated route discoveries that need to be initiated frequently due to link breakages on active routes. Besides, all ad hoc networks are prone to high routing overhead due to query flooding during route discovery. Existing routin ..."
Abstract - Add to MetaCart
Ad hoc networks with high mobility profiles suffer from the problem of repeated route discoveries that need to be initiated frequently due to link breakages on active routes. Besides, all ad hoc networks are prone to high routing overhead due to query flooding during route discovery. Existing

Query Restricted Bottom-up Evaluation of Normal Logic Programs

by David Kemp, Peter J. Stuckey, Divesh Srivastava - In Joint Intl. Conference and Symposium on Logic Programming , 1992
"... Several program transformations---magic sets, envelopes, NRSU transformations and context transformations, among others---have been proposed for efficiently computing the answers to a query while taking advantage of the query constants. These transformations use sideways information passing strategi ..."
Abstract - Cited by 17 (6 self) - Add to MetaCart
strategies (sips) to restrict bottom-up evaluation to facts potentially relevant to the query. It is of interest to extend these transformations to all logic programs with negation, and identify classes of programs and sips for which these transformations preserve well-founded models with respect

Security-control methods for statistical databases: a comparative study

by Nabil R. Adam, John C. Wortmann - ACM Computing Surveys , 1989
"... This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation. ..."
Abstract - Cited by 416 (0 self) - Add to MetaCart
This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation

Searching in metric spaces

by Edgar Chávez, Gonzalo Navarro, Ricardo Baeza-yates, José Luis Marroquín , 2001
"... The problem of searching the elements of a set that are close to a given query element under some similarity criterion has a vast number of applications in many branches of computer science, from pattern recognition to textual and multimedia information retrieval. We are interested in the rather gen ..."
Abstract - Cited by 436 (38 self) - Add to MetaCart
The problem of searching the elements of a set that are close to a given query element under some similarity criterion has a vast number of applications in many branches of computer science, from pattern recognition to textual and multimedia information retrieval. We are interested in the rather

Stochastic Protection of Confidential Information in Databases: A Hybrid of Data Perturbation and Query Restriction

by Manuel A. Nunez, Robert S. Garfinkel, Ram D. Gopal
"... Data perturbation and query restriction are two of the main methods that have been developed to protect confidential data in statistical database systems. In the former the confidential data is systematically changed to maintain its distributional properties, and to yield answers to queries that are ..."
Abstract - Add to MetaCart
Data perturbation and query restriction are two of the main methods that have been developed to protect confidential data in statistical database systems. In the former the confidential data is systematically changed to maintain its distributional properties, and to yield answers to queries

On the Decidability of Query Containment under Constraints

by Diego Calvanese, Giuseppe De Giacomo, et al.
"... Query containment under constraints is the problem of checking whether for every database satisfying a given set of constraints, the result of one query is a subset of the result of another query. Recent research points out that this is a central problem in several database applications, and we addr ..."
Abstract - Cited by 256 (56 self) - Add to MetaCart
number restrictions. To the best of our knowledge, this yields the first decidability result on containment of conjunctive queries with regular expressions. Finally, we prove that the problem is undecidable for the case where we admit inequalities in q′.

An assumption-based truth-maintenance system

by Raymond Reiter, Johan De Kleer - Artificial Intelligence , 1986
"... In this paper we (1) define the concept of a Clause Man-agetnent System (CMS) — a generaizatiou of de Kleer’s ATMS, (2) motivate such systems in terms of efficiency of search and abductive reasoning, and (3) characterize the computation affected by a CMS in terms of the concept of prime implicants. ..."
Abstract - Cited by 334 (11 self) - Add to MetaCart
it does, oc-casionally transmits a propositional clause2 to the CMS. The Reasoner is also permitted to query the CMS any time it feels so inclined. A query takes the form of a proposi-tional clause C. The CMS is expected to respond with every shortest clause S for which the clause S V C is a log

Evaluating Top-k Queries over Web-Accessible Databases

by Amélie Marian, Nicolas Bruno, Luis Gravano - ACM TRANS. ON DATABASE SYSTEMS , 2004
"... ... In this article, we study how to process top-k queries efficiently in this setting, where the attributes for which users specify target values might be handled by external, autonomous sources with a variety of access interfaces. We present a sequential algorithm for processing such queries, but ..."
Abstract - Cited by 253 (15 self) - Add to MetaCart
may impose some restrictions on the type and number of probes that they are willing to accept. We adapt our sequential query processing technique and introduce an efficient algorithm that maximizes sourceaccess parallelism to minimize query response time, while satisfying source-access constraints.
Next 10 →
Results 1 - 10 of 2,134
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University