... and still maintain privacy and sometimes anonymity. We also
need to examine the inference problem for the semantic web. Inference is the
process of posing queries and deducing new information. ... computa-
tional origins and information systems engineering aspects have received scant
attention. The development within the GRID community of the W3C-inspired
OGSA indicates a willingness to move in a direction ... data information about individuals that one
can obtain within seconds. The data could be structured data or could be mul-
timedia data. Information could be obtained through mining or just from in-
formation...
... spatial index over object locations.
Indexing Queries. The second centralized approach to processing spatial continuous
queries on moving objects is by indexing queries. In this approach a spatial index, ... watermark.
Energy-Conserving Air Indexes for Nearest Neighbor Search
51
Fig. 1. Data and Index Organization Using the Interleaving Technique
for broadcasting along with the data objects [8]. By first examining the index
information ... enabling a single linear access of the upper-level index for any
query point. In addition, to avoid rollback operations in the lower-level index, we
try to maintain each grid cell in a size such...
... minimize
the information loss in moving from clustering to clustering This information
loss is given by We can also view the information
loss as the increase in the uncertainty. Recall that
Since
H(A) ... Constrained Indexing and Query Indexing are proposed
for efficient evaluation of this kind of queries at a central location. Several other indexing
structures and algorithms for handling moving ... P., Fayyad, U., & Reina, C. (1998). Scaling Clustering Algorithms to Large
Databases. In proceedings of the Int’l Conference on Knowledge Discovery and Data
Mining. New York, NY, Aug 27-31....
... is based upon ciphertext, while, in the
second, the intermediate index is based upon plaintext and the final index is
obtained by encrypting the intermediate index. Based upon characteristics ... xor-ing them) to obtain ciphertext.
Decryption involves reversing the process: combining the key-stream with the
ciphertext to obtain the original plaintext. Along with the initial encryption key,
additional ... ciphers involve creating a key-stream based on a fixed key (and,
optionally, counter, previous ciphertext, or previous plaintext) and combining
it with the plaintext in some way (e.g, by xor-ing...
... mining algorithms. In this paper, we will develop a new
and flexible approach for privacy preserving data mining which does
not require new problem-specific algorithms, since it maps the original
data ... sensitive
information is guaranteed. In this paper, we propose a new framework for
privacy preserving data mining of multi-dimensional data. Previous work
for privacy preserving data mining uses ... and adding the set
is obtained by replacing and with their union. For both and
associates to the new sets in an algorithm enabling the evaluation of
pred in the compressed domain and having the...
... relational
databases into an XML format or to store the information in an XML object in
a relational database, increasing the cost of e-business development. Moreover,
specifying the mapping in the application ... DB-to-XML mapping, into several
modified mappings in order to support clients that require various por-
tions of the mapping-defined data. Mapping rewriting has the effect of
reducing the amount ... USA,
2002.
J. Chomicki. Querying with intrinsic preferences. In Proc. of the Int. Conf. on Advances in
Database Technology (EDBT), Prague, Czech Republic, 2002
R. Fagin, A. Lotem, M. Naor. Optimal...
... let us
introduce the collinear relation between a point and two regions.
Definition 9. A point P is collinear to two regions B and C, collinear(P, B, C), if
there exists a line
l
intersecting ... Surveying
Engineering, University of Maine, Orono, ME.
Freksa, C., Using Orientation Information for Qualitative Spatial Reasoning, in Theories
and Models of Spatio-Temporal Reasoning in Geographic ... environment.
5.3
Phonetic Indexing
We now outline a phonetic indexing technique that may be used for accessing the near-
equal phonemic strings, using a standard database index. We exploit the following two
facts...
... designing the annotation
specifications, considering the specifics of data integrity constraint checking, and
ascertaining the impact on particular tools remain challenging (and interesting) tasks.
focuses ... (i.e., in Fig. 9), in the fourth case, we use
the south line of and in the last case, we use the north line of
In all cases, we use the edges of that fall in the tile of that
we are interested in. ... remove this watermark.
Computing and Handling Cardinal Direction Information
335
Fig. 3. Polygon clipping
3
Computing Cardinal Direction Relations
Typically, in Geographical Information Systems and...
... con-
taining a given point” can also occur in practice (for instance, in a publish-
subscribe application where subscriptions define interval ranges as attributes,
and events can be points in these ... the minimum bounding constraint, which increases the general
overlap. In memory, for instance, RS verifies four times more objects than AC.
Point-Enclosing Queries. Because queries like “find ... between index nodes from corresponding trees in a priority
queue and recursively (top-down) refining the search. In this case, using
histograms, one could perform, in addition to the type of pruning...
... projection pushing and join
reordering in terms of the treewidth of the join graph. (Note that the focus in [28] is on
projection pushing in recursive queries; the non-recursive case is not investigated.)
While ... section.
5
Improvements Using Domain Information
So far we have discussed in what cases we do not need to normalize queries in
the containment test, and in what cases we can reduce the containment test to
checking ... combine early projection and join reordering in an implementation
of the bucket-elimination method from constraint satisfaction to obtain another
exponential improvement.
1
Introduction
The join...
... query range into three
new columns, as shown in Figure 8(a). These three new columns with the original
rows, divide the query range into new tiles (the new tiles in column 3 contain less
data ... to access the data in each new column.
After accessing one of the new columns, instead of moving the media sled back
to the coordinates of row 1 every time (thus introducing a new seek), the media
sled ... process of integrating it into computing systems, some prior
approaches have been proposed to map MEMS-based storage into disk-like devices.
Using disk terminology, a cylinder is defined as the...
... and since each iteration is actually
a generalized bargaining step, using a nested bargaining within a bargaining will only
increase the number of exchanged messages.
4
Experimental Study
In order ... be
computed quickly, in a single pass over the data tuples inin the (arbitrary) order
of their arrival. At any point in time, our query-processing algorithms can combine the
maintained collection ... original query The problem of finding these plans
is identical to the answering queries using materialized views [20] problem. In general,
this problem is NP-Complete, since it involves searching...
... Srikant. Mining Sequential Patterns. In Proc. of the 11th Int.
Conf. on Data Engineering, Taipei, Taiwan, March 1995.
W. Aref, M. Elfeky, and A. Elmagarmid. Incremental, Online, and Merge Mining
of ... of XJoin. We
differ
in
that
no
previous
work
incorporates both constraint-exploiting mech-
anism and adaptivity into join execution logic itself. Unlike the k-constraint-
exploiting algorithm, ... joins nor k-constraint-exploiting algorithms do.
6
Discussion: Extending PJoin Beyond Punctuations
The current implementation of PJoin is a binary equi-join without exploiting
window specifications...
... defined by Definition 7, by finding
all dead states in the intersection automaton of and to determine The
set of states, as defined by Definition 8, can also be determined, in linear
time, using ... SIGMOD
1997.
R. Pieringer et al: Combining Hierarchy Encoding and Pre-Grouping: Intelligent Grouping
in Star Join Processing. ICDE 2003.
F. Ramsak et al: Integrating the UB-Tree into a Database System ... 2000.
B. Kane, H. Su, and E. A. Rundensteiner. Consistently updating XML documents
using incremental constraint check queries. In Proceedings of the Workshop on
Web Information and Data Management (WIDM’02),...