Search

Your search keyword '"databases"' showing total 1,026 results

Search Constraints

Start Over You searched for: Descriptor "databases" Remove constraint Descriptor: "databases" Journal ieee transactions on knowledge & data engineering Remove constraint Journal: ieee transactions on knowledge & data engineering
1,026 results on '"databases"'

Search Results

1. Discovering and Analyzing Contextual Behavioral Patterns From Event Logs.

2. Efficient Oblivious Query Processing for Range and kNN Queries.

3. Erasable Virtual HyperLogLog for Approximating Cumulative Distribution over Data Streams.

4. A Linear Time Approach to Computing Time Series Similarity Based on Deep Metric Learning.

5. Data Dependencies Extended for Variety and Veracity: A Family Tree.

6. Verifying the Correctness of Analytic Query Results.

7. Towards an Optimal Bus Frequency Scheduling: When the Waiting Time Matters.

8. LogStore: A Workload-Aware, Adaptable Key-Value Store on Hybrid Storage Systems.

9. Cleaning Uncertain Data With Crowdsourcing - A General Model With Diverse Accuracy Rates.

10. GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy.

11. Strict and Flexible Rule-Based Graph Repairing.

12. Anomaly Detection in Quasi-Periodic Time Series Based on Automatic Data Segmentation and Attentional LSTM-CNN.

13. Topic-Guided Conversational Recommender in Multiple Domains.

14. Embedded Transaction Support Inside SSD With Small-Capacity Non-Volatile Disk Cache.

15. Database Meets Artificial Intelligence: A Survey.

16. Leveraging Currency for Repairing Inconsistent and Incomplete Data.

17. G-PICS: A Framework for GPU-Based Spatial Indexing and Query Processing.

18. Unsupervised Entity Resolution With Blocking and Graph Algorithms.

19. Effective Keyword Search Over Weighted Graphs.

20. Deep Cross-Modal Hashing With Hashing Functions and Unified Hash Codes Jointly Learning.

21. Hihooi: A Database Replication Middleware for Scaling Transactional Databases Consistently.

22. Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data.

23. Cross-Database Micro-Expression Recognition: A Benchmark.

24. Subgraph Matching With Effective Matching Order and Indexing.

25. Collaborative Learning for Extremely Low Bit Asymmetric Hashing.

26. Publicly Verifiable Databases With All Efficient Updating Operations.

27. Streaming Algorithms for Estimating High Set Similarities in LogLog Space.

28. Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique.

29. Improving the Quality of Web-Based Data Imputation With Crowd Intervention.

30. Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey.

31. On the Efficient Representation of Datasets as Graphs to Mine Maximal Frequent Itemsets.

32. ConcurDB: Concurrent Query Authentication for Outsourced Databases.

33. The Power of Bounds: Answering Approximate Earth Mover's Distance with Parametric Bounds.

34. Enhanced Privacy Preserving Group Nearest Neighbor Search.

35. A Comparative Study of Consistent Snapshot Algorithms for Main-Memory Database Systems.

36. Security and Privacy Implications on Database Systems in Big Data Era: A Survey.

37. On Nearby-Fit Spatial Keyword Queries.

38. User Group Analytics Survey and Research Opportunities.

39. Equilibrium of Redundancy in Relational Model for Optimized Data Retrieval.

40. Privacy-Preserving User Profile Matching in Social Networks.

41. Answering Top-$k$ k Graph Similarity Queries in Graph Databases.

42. Efficient Contour Computation of Group-Based Skyline.

43. The Disruptions of 5G on Data-Driven Technologies and Applications.

44. Semi-Supervised Learning with Auto-Weighting Feature and Adaptive Graph.

45. Mining Behavioral Sequence Constraints for Classification.

46. ChronoGraph: Enabling Temporal Graph Traversals for Efficient Information Diffusion Analysis over Time.

47. Scheduling Resources to Multiple Pipelines of One Query in a Main Memory Database Cluster.

48. Design and Implementation of SSD-Assisted Backup and Recovery for Database Systems.

49. Enriching Data Imputation under Similarity Rule Constraints.

50. ROMIR: Robust Multi-View Image Re-Ranking.

Catalog

Books, media, physical & digital resources