default search action
IDEAS 2006: Delhi, India
- Bipin C. Desai, Shyam K. Gupta:
Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 11-14 December 2006, Delhi, India. IEEE Computer Society 2006, ISBN 0-7695-2577-6
Full Papers
- George A. Mihaila, Ioana Stanoi:
A Tree for All Seasons. 3-10 - Claus A. Christensen, Steen Gundersborg, Kristian de Linde, Kristian Torp:
A Unit-Test Framework for Database Applications. 11-20 - Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa:
CADRE: A Collaborative replica allocation and deallocation approach for Mobile-P2P networks. 21-28 - Panagiotis Symeonidis, Alexandros Nanopoulos, Apostolos Papadopoulos, Yannis Manolopoulos:
Collaborative Filtering Process in a Whole New Light. 29-36 - Katja Hose, Daniel Klan, Kai-Uwe Sattler:
Distributed Data Summaries for Approximate Query Processing in PDMS. 37-44 - Francesco Folino, Giuseppe Manco, Luigi Pontieri:
Effective Incremental Clustering for Duplicate Detection in Large Databases. 45-52 - Maria Kontaki, Apostolos N. Papadopoulos, Yannis Manolopoulos:
Efficient Incremental Subspace Clustering in Data Streams. 53-60 - Carson Kai-Sang Leung, Quamrul I. Khan:
Efficient Mining of Constrained Frequent Patterns from Streams. 61-68 - Michal Krátký, Václav Snásel, Jaroslav Pokorný, Pavel Zezula:
Efficient Processing of Narrow Range Queries in Multi-dimensional Data Structures. 69-79 - Wolf-Tilo Balke, Ulrich Güntzer, Wolf Siberski:
Exploiting Indifference for Customization of Partial Order Skylines. 80-88 - Dimitrios Katsaros, Nikos Dimokas, Yannis Manolopoulos:
Generalized Indexing for Energy-Efficient Access to Partially Ordered Broadcast Data inWireless Networks. 89-96 - Shibashis Guha, Srinath Srinivasa, Saikat Mukherjee, Ranajoy Malakar:
LogicFence: A Framework for Enforcing Global Integrity Constraints at Runtime. 97-104 - Linas Baltrunas, Arturas Mazeika, Michael H. Böhlen:
Multi-dimensional Histograms with Tight Bounds for the Error. 105-112 - Zhenglu Yang, Masaru Kitsuregawa, Yitong Wang:
PAID: Mining Sequential Patterns by Passed Item Deduction in Large Databases. 113-120 - Alex Gurevich, Ehud Gudes:
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. 121-128 - Ravi Chandra Jammalamadaka, Sharad Mehrotra:
Querying Encrypted XML Documents. 129-136 - Wolfgang Lindner, Jörg Meier:
Securing the Borealis Data Stream Engine. 137-147 - Maik Thiele, Wolfgang Lehner:
Shrinked Data Marts Enabled for Negative Caching. 148-157 - Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubramanian:
SURCH: Distributed Aggregation over Wireless Sensor Networks. 158-165 - Yehia Taher, Djamal Benslimane, Marie-Christine Fauvet, Zakaria Maamar:
Towards an Approach forWeb services Substitution. 166-173 - Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefan Schönauer:
Towards Traceability across Sovereign, Distributed RFID Databases. 174-184 - Eleftherios Tiakas, Apostolos N. Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos, Dragan Stojanovic, Slobodanka Djordjevic-Kajan:
Trajectory Similarity Search in Spatial Networks. 185-192 - Christoph Mangold, Holger Schwarz, Bernhard Mitschang:
u38: A Framework for Database-Supported Enterprise Document-Retrieval. 193-200 - Md Mahmudur Rahman, Bipin C. Desai, Prabir Bhattacharya:
Visual Keyword-based Image Retrieval using Latent Semantic Indexing, Correlation-enhanced Similarity Matching and Query Expansion in Inverted Index. 201-208 - Rajagopal Rajugan, Elizabeth Chang, Ling Feng, Tharam S. Dillon:
Visual Modeling of Behavioral Properties in the LVM for XML Using XSemantic Nets. 209-219 - Srinidhi Kannappady, Sudhir P. Mudur, Nematollaah Shiri:
Visualization of Web Usage Patterns. 220-227 - Béatrice Bouchou, Ahmed Cheriat, Mirian Halfeld Ferrari Alves, Agata Savary:
XML Document Correction: Incremental Approach Activated by Schema Validation. 228-238
Short Papers
- Konstantinos Stamos, George Pallis, Charilaos Thomos, Athena Vakali:
A similarity based approach for integrated Web caching and content replication in CDNs. 239-242 - Jorge Loureiro, Orlando Belo:
An Evolutionary Approach to the Selection and Allocation of Distributed Cubes. 243-0248 - Victor Muntés-Mulero, Josep Lluís Larriba-Pey, Josep Aguilar-Saborit, Calisto Zuzarte, Volker Markl:
An inside analysis of a genetic-programming based optimizer. 249-255 - Chun Jin, Jaime G. Carbonell:
ARGUS: Efficient Scalable Continuous Query Optimization for Large-Volume Data Streams. 256-262 - L. Vibha, G. M. Harshavardhan, K. Pranaw, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Classification of Mammograms Using Decision Trees. 263-266 - Sonia Guehis, Philippe Rigaux, Emmanuel Waller:
Data-Driven Publication of Relational Databases. 267-272 - Udai Shanker, Manoj Misra, Anil Kumar Sarje, Rahul Shisondia:
Dependency Sensitive Shadow SWIFT. 273-276 - Umakanth P. Kulkarni, K. K. Tangod, S. R. Mangalwede, Anil R. Yardi:
Exploring the Capabilities of Mobile Agents in Distributed Data Mining. 277-280 - Ricardo Jorge Santos, Jorge Bernardino:
Global Epidemiological Outbreak Surveillance System Architecture. 281-284 - Luciano Caroprese, Cristian Molinaro, Ester Zumpano:
Integrating and Querying P2P Deductive Databases. 285-290 - Xiaogang Li, Gagan Agrawal:
Parallelizing XQuery In a Cluster Environment. 291-294 - Iryna Kozlova, Norbert Ritter, Olga Reimer:
Towards Integrated Query Processing for Object-Relational and XML Data Sources. 295-300 - Qin Zhu, Ying Yang, Jiajin Le, Yishu Luo:
Watermark Based Copyright Protection of Outsourced Database. 301-308
Poster Papers
- Jyoti Pawar, P. R. Rao:
An Attribute Based Storage Method for Speeding up CLIQUE Algorithm for Subspace Clustering. 309-310 - Vikram Goyal, Shyam K. Gupta, Anand Gupta:
Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading. 311-312 - Anindya Chakraborty, Manoj K. Garg, Arun K. Majumdar, Shamik Sural:
Online Recovery of a Distributed Database from Malicious Attack. 313-314 - Ashwani Garg, Ashish Mangla, Neelima Gupta, Vasudha Bhatnagar:
PBIRCH: A Scalable Parallel Clustering algorithm for Incremental Data. 315-316 - Xiangdong An, Dawn N. Jutla, Nick Cercone:
Probabilistic Internal Privacy Intrusion Detection. 317-318 - Alberto Portilla, Christine Collet, Genoveva Vargas-Solar:
Towards a transactional services coordination model. 319-320 - Angela Bonifati, Alfredo Cuzzocrea:
Towards a Lightweight Framework for Privacy Preserving P2P XML Databases. 321-324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.