不规则的跳动 发表于 2025-3-27 00:19:15

http://reply.papertrans.cn/27/2635/263424/263424_31.png

变异 发表于 2025-3-27 01:38:20

http://reply.papertrans.cn/27/2635/263424/263424_32.png

Jargon 发表于 2025-3-27 07:05:49

What Have We Learnt from Deductive Object-Oriented Database Research?ursive deductive rules and recursive queries. Moreover, deductive databases have a firm logical foundation that consists of both model-theoretic semantics in terms of the minimal model , the stable model , and the well-founded model , and proof-theoretic semantics in terms of bottom-up fixp

颂扬国家 发表于 2025-3-27 13:18:46

http://reply.papertrans.cn/27/2635/263424/263424_34.png

Delude 发表于 2025-3-27 13:53:55

Distributed Privacy Preserving Data Collectionencryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of th

lobster 发表于 2025-3-27 19:54:59

Privacy Preserving Query Processing on Secret Share Based Data Storagex to accelerate query and to help return the exactly required data tuples. Finally we analyze the security properties and demonstrate the efficiency and query response time of our approach through empirical data.

泰然自若 发表于 2025-3-28 00:29:10

http://reply.papertrans.cn/27/2635/263424/263424_37.png

carotid-bruit 发表于 2025-3-28 02:18:54

STS: Complex Spatio-Temporal Sequence Mining in Flickrscene, and its difference for different users, as well as the travel time limitation. In this paper, we provide two approximate algorithms: a local optimization algorithm and a global optimization algorithm. Finally, we give an experimental evaluation of the proposed algorithms using real datasets i

esoteric 发表于 2025-3-28 08:37:59

Node Protection in Weighted Social Networksps prevent node re-identification in the weighted graph based on three distance functions which measure the nodes’ difference. We also design corresponding algorithms for each distance to achieve anonymity. Some experiments on real datasets show the effectiveness of our methods.

EPT 发表于 2025-3-28 13:24:46

http://reply.papertrans.cn/27/2635/263424/263424_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Database Systems for Advanced Applications; 16th International C Jeffrey Xu Yu,Myoung Ho Kim,Rainer Unland Conference proceedings 2011 Spri