


default search action
IDEAS 2006: Delhi, India
- Bipin C. Desai, Shyam K. Gupta:

Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 11-14 December 2006, Delhi, India. IEEE Computer Society 2006, ISBN 0-7695-2577-6
Full Papers
- George A. Mihaila

, Ioana Stanoi:
A Tree for All Seasons. 3-10 - Claus A. Christensen, Steen Gundersborg, Kristian de Linde, Kristian Torp:

A Unit-Test Framework for Database Applications. 11-20 - Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa:

CADRE: A Collaborative replica allocation and deallocation approach for Mobile-P2P networks. 21-28 - Panagiotis Symeonidis

, Alexandros Nanopoulos, Apostolos Papadopoulos, Yannis Manolopoulos:
Collaborative Filtering Process in a Whole New Light. 29-36 - Katja Hose

, Daniel Klan, Kai-Uwe Sattler:
Distributed Data Summaries for Approximate Query Processing in PDMS. 37-44 - Francesco Folino

, Giuseppe Manco
, Luigi Pontieri
:
Effective Incremental Clustering for Duplicate Detection in Large Databases. 45-52 - Maria Kontaki, Apostolos N. Papadopoulos, Yannis Manolopoulos:

Efficient Incremental Subspace Clustering in Data Streams. 53-60 - Carson Kai-Sang Leung

, Quamrul I. Khan:
Efficient Mining of Constrained Frequent Patterns from Streams. 61-68 - Michal Krátký

, Václav Snásel, Jaroslav Pokorný, Pavel Zezula:
Efficient Processing of Narrow Range Queries in Multi-dimensional Data Structures. 69-79 - Wolf-Tilo Balke

, Ulrich Güntzer, Wolf Siberski:
Exploiting Indifference for Customization of Partial Order Skylines. 80-88 - Dimitrios Katsaros, Nikos Dimokas

, Yannis Manolopoulos:
Generalized Indexing for Energy-Efficient Access to Partially Ordered Broadcast Data inWireless Networks. 89-96 - Shibashis Guha, Srinath Srinivasa

, Saikat Mukherjee, Ranajoy Malakar:
LogicFence: A Framework for Enforcing Global Integrity Constraints at Runtime. 97-104 - Linas Baltrunas, Arturas Mazeika, Michael H. Böhlen

:
Multi-dimensional Histograms with Tight Bounds for the Error. 105-112 - Zhenglu Yang

, Masaru Kitsuregawa, Yitong Wang:
PAID: Mining Sequential Patterns by Passed Item Deduction in Large Databases. 113-120 - Alex Gurevich, Ehud Gudes:

Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. 121-128 - Ravi Chandra Jammalamadaka, Sharad Mehrotra:

Querying Encrypted XML Documents. 129-136 - Wolfgang Lindner, Jörg Meier:

Securing the Borealis Data Stream Engine. 137-147 - Maik Thiele

, Wolfgang Lehner
:
Shrinked Data Marts Enabled for Negative Caching. 148-157 - Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubramanian:

SURCH: Distributed Aggregation over Wireless Sensor Networks. 158-165 - Yehia Taher, Djamal Benslimane, Marie-Christine Fauvet, Zakaria Maamar:

Towards an Approach forWeb services Substitution. 166-173 - Rakesh Agrawal, Alvin Cheung

, Karin Kailing, Stefan Schönauer:
Towards Traceability across Sovereign, Distributed RFID Databases. 174-184 - Eleftherios Tiakas

, Apostolos N. Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos, Dragan Stojanovic
, Slobodanka Djordjevic-Kajan:
Trajectory Similarity Search in Spatial Networks. 185-192 - Christoph Mangold, Holger Schwarz, Bernhard Mitschang:

u38: A Framework for Database-Supported Enterprise Document-Retrieval. 193-200 - Md Mahmudur Rahman, Bipin C. Desai, Prabir Bhattacharya:

Visual Keyword-based Image Retrieval using Latent Semantic Indexing, Correlation-enhanced Similarity Matching and Query Expansion in Inverted Index. 201-208 - Rajagopal Rajugan, Elizabeth Chang

, Ling Feng, Tharam S. Dillon:
Visual Modeling of Behavioral Properties in the LVM for XML Using XSemantic Nets. 209-219 - Srinidhi Kannappady, Sudhir P. Mudur, Nematollaah Shiri:

Visualization of Web Usage Patterns. 220-227 - Béatrice Bouchou, Ahmed Cheriat, Mirian Halfeld Ferrari Alves

, Agata Savary:
XML Document Correction: Incremental Approach Activated by Schema Validation. 228-238
Short Papers
- Konstantinos Stamos, George Pallis

, Charilaos Thomos, Athena Vakali
:
A similarity based approach for integrated Web caching and content replication in CDNs. 239-242 - Jorge Loureiro, Orlando Belo

:
An Evolutionary Approach to the Selection and Allocation of Distributed Cubes. 243-0248 - Victor Muntés-Mulero

, Josep Lluís Larriba-Pey
, Josep Aguilar-Saborit, Calisto Zuzarte
, Volker Markl:
An inside analysis of a genetic-programming based optimizer. 249-255 - Chun Jin, Jaime G. Carbonell:

ARGUS: Efficient Scalable Continuous Query Optimization for Large-Volume Data Streams. 256-262 - L. Vibha, G. M. Harshavardhan, K. Pranaw, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:

Classification of Mammograms Using Decision Trees. 263-266 - Sonia Guehis

, Philippe Rigaux, Emmanuel Waller:
Data-Driven Publication of Relational Databases. 267-272 - Udai Shanker

, Manoj Misra, Anil Kumar Sarje, Rahul Shisondia:
Dependency Sensitive Shadow SWIFT. 273-276 - Umakanth P. Kulkarni, K. K. Tangod, S. R. Mangalwede, Anil R. Yardi:

Exploring the Capabilities of Mobile Agents in Distributed Data Mining. 277-280 - Ricardo Jorge Santos, Jorge Bernardino

:
Global Epidemiological Outbreak Surveillance System Architecture. 281-284 - Luciano Caroprese

, Cristian Molinaro
, Ester Zumpano:
Integrating and Querying P2P Deductive Databases. 285-290 - Xiaogang Li, Gagan Agrawal:

Parallelizing XQuery In a Cluster Environment. 291-294 - Iryna Kozlova, Norbert Ritter, Olga Reimer:

Towards Integrated Query Processing for Object-Relational and XML Data Sources. 295-300 - Qin Zhu, Ying Yang, Jiajin Le, Yishu Luo:

Watermark Based Copyright Protection of Outsourced Database. 301-308
Poster Papers
- Jyoti Pawar, P. R. Rao:

An Attribute Based Storage Method for Speeding up CLIQUE Algorithm for Subspace Clustering. 309-310 - Vikram Goyal, Shyam K. Gupta, Anand Gupta

:
Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading. 311-312 - Anindya Chakraborty, Manoj K. Garg, Arun K. Majumdar, Shamik Sural

:
Online Recovery of a Distributed Database from Malicious Attack. 313-314 - Ashwani Garg, Ashish Mangla, Neelima Gupta, Vasudha Bhatnagar

:
PBIRCH: A Scalable Parallel Clustering algorithm for Incremental Data. 315-316 - Xiangdong An

, Dawn N. Jutla, Nick Cercone:
Probabilistic Internal Privacy Intrusion Detection. 317-318 - Alberto Portilla, Christine Collet, Genoveva Vargas-Solar

:
Towards a transactional services coordination model. 319-320 - Angela Bonifati

, Alfredo Cuzzocrea
:
Towards a Lightweight Framework for Privacy Preserving P2P XML Databases. 321-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














