Demonstration of Accelerating Machine Learning Inference Queries with Correlative Proxy Models. | 0 | 0.34 | 2022 |
Optimizing Machine Learning Inference Queries with Correlative Proxy Models. | 0 | 0.34 | 2022 |
Learning-Based Optimization for Online Approximate Query Processing | 0 | 0.34 | 2022 |
Staged query graph generation based on answer type for question answering over knowledge base | 0 | 0.34 | 2022 |
Optimizing Machine Learning Inference Queries with Correlative Proxy Models. | 0 | 0.34 | 2022 |
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management | 0 | 0.34 | 2021 |
An Agile Sample Maintenance Approach for Agile Analytics | 0 | 0.34 | 2020 |
POLYTOPE: a flexible sampling system for answering exploratory queries | 1 | 0.34 | 2020 |
senDroid: Auditing Sensor Access in Android System-Wide | 1 | 0.37 | 2020 |
Answering unique topic queries with dynamic threshold. | 0 | 0.34 | 2019 |
A Full-Spectrum Blockchain-as-a-Service for Business Collaboration | 1 | 0.35 | 2019 |
An Automatic Illustration Recommendation System. | 0 | 0.34 | 2019 |
DESC: enabling secure data exchange based on smart contracts. | 7 | 0.60 | 2018 |
Finding maximal ranges with unique topics in a text database. | 1 | 0.35 | 2018 |
Unique Topic Query Processing On Cloud | 0 | 0.34 | 2018 |
A System for Exploratory Analysis in Cloud | 0 | 0.34 | 2018 |
Entity Suggestion with Conceptual Expanation. | 1 | 0.35 | 2017 |
Camera-Recognizable and Human-Invisible Labelling for Privacy Protection | 0 | 0.34 | 2016 |
Semi-Homogenous Generalization: Improving Homogenous Generalization for Privacy Preservation in Cloud Computing. | 3 | 0.40 | 2016 |
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. | 8 | 0.48 | 2016 |
Converting Spatiotemporal Data Among Heterogeneous Granularity Systems | 1 | 0.40 | 2016 |
Editorial for the special issue on advanced information systems for the Web | 0 | 0.34 | 2014 |
Large Scale Real-time Ridesharing with Service Guarantee on Road Networks. | 0 | 0.34 | 2014 |
Cost-Based Optimization Of Logical Partitions For A Query Workload In A Hadoop Data Warehouse | 0 | 0.34 | 2014 |
Cost-Based Join Algorithm Selection In Hadoop | 2 | 0.36 | 2014 |
How to share data securely | 0 | 0.34 | 2013 |
Vetting undesirable behaviors in android apps with permission use analysis | 134 | 3.69 | 2013 |
Tracking the Dynamic Distribution of People in Indoor Space with Noisy Partitioning Sensors | 0 | 0.34 | 2012 |
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies | 63 | 2.42 | 2011 |
Reusing Relational Queries for Intuitive Decision Optimization | 8 | 0.81 | 2011 |
Panel: research agenda for data and application security | 0 | 0.34 | 2011 |
In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud | 15 | 1.19 | 2010 |
Finding One-Of Probably Nearest Neighbors with Minimum Location Updates | 0 | 0.34 | 2010 |
Evaluating privacy threats in released database views by symmetric indistinguishability | 2 | 0.36 | 2009 |
Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security] | 9 | 0.54 | 2009 |
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS | 15 | 0.71 | 2009 |
AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users | 10 | 0.63 | 2009 |
Anonymity and Historical-Anonymity in Location-Based Services | 23 | 0.88 | 2009 |
A decisions query language (DQL): high-level abstraction for mathematical programming over databases | 10 | 0.88 | 2009 |
Proactive and reactive multi-dimensional histogram maintenance for selectivity estimation | 3 | 0.40 | 2008 |
Mining partial periodic correlations in time series | 8 | 0.48 | 2008 |
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques | 11 | 0.67 | 2008 |
Authorization in trust management: Features and foundations | 33 | 1.51 | 2008 |
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008 | 8 | 0.84 | 2008 |
Continually answering constraint k-NN queries in unstructured P2P systems | 0 | 0.34 | 2008 |
Risk management for distributed authorization | 6 | 0.48 | 2007 |
A Weighted Moving Average-based Approach for Cleaning Sensor Data | 35 | 1.65 | 2007 |
Adaptive-Size Reservoir Sampling over Data Streams | 20 | 0.81 | 2007 |
Global Visualizaiton and Comparision of DNA Sequences by Use of Three-Dimensional Trajectories | 0 | 0.34 | 2007 |
The Role of Quasi-identifiers in k-Anonymity Revisited | 6 | 0.66 | 2006 |