the proceedings contain 85 papers from the databasesystems for advancedapplications - 10thinternationalconference, dasfaa 2005, proceedings. the topics discussed include: data stream mining and resource adaptive c...
详细信息
the proceedings contain 85 papers from the databasesystems for advancedapplications - 10thinternationalconference, dasfaa 2005, proceedings. the topics discussed include: data stream mining and resource adaptive computation;purpose based access control for privacy protection in databasesystems;indexing DNA sequences using q-Grams;PADS: protein structure alignment using directional shape signatures;linkage tracker: a discriminative pattern tracking approach to linkage disquisition mapping;query optimization in encrypted databasesystems;effective approaches for watermarking XML data;and an efficient approach to extracting approximate repeating patterns in music databases.
the proceedings contain 26 papers. the special focus in this conference is on Big Data Management and Service. the topics include: FAIth: A Fast, Accurate, and Lightweight database-Agnostic Learned Cost Model;fas...
ISBN:
(纸本)9789819609130
the proceedings contain 26 papers. the special focus in this conference is on Big Data Management and Service. the topics include: FAIth: A Fast, Accurate, and Lightweight database-Agnostic Learned Cost Model;fast Approximate Temporal Butterfly Counting on Bipartite Graphs via Edge Sampling;Financial-ICS: Identifying Peer Firms via LongBERT from 10K Reports;establishing a Decentralized Diamond Quality Management System: Advancing Towards Global Standardization;co-estimation of Data Types and their Positional Distribution;Enhancing Load Forecasting with VAE-GAN-Based Data Cleaning for Electric Vehicle Charging Loads;audio-Guided Visual Knowledge Representation;boundary Point Detection Combining Gravity and Outlier Detection Methods;A Meta-learning Approach for Category-Aware Sequential Recommendation on POIs;automatic Post-editing of Speech Recognition System Output Using Large Language Models;comparative Analysis with Multiple Large-Scale Language Models for Automatic Generation of Funny Dialogues;effectiveness of the Programmed Visual Contents Comparison Method for Two Phase Collaborative Learning in Computer Programming Education: A Case Study;generating Achievement Relationship Graph Between Actions for Alternative Solution Recommendation;generating News Headline Containing Specific Person Name;Investigating Evidence in Sentence Similarity Using MASK in BERT;acceleration of Synopsis Construction for Bounded Approximate Query Processing;Query Expansion in Food Review Search with Synonymous Phrase Generation by LLM;Question Answer Summary Generation from Unstructured Texts by Using LLMs;Real Estate Information Exploration in VR with LoD Control by Physical Distance;voices of Asynchronous Learning Students: Revealing Learning Characteristics through Vocabulary Analysis of Notes Tagged in Videos;review Search Interface Based on Search Result Summarization Using Large Language Model;yes-No Flowchart Generation for Interactive Exploration of Personalized Health Improve
To ensure the privacy of data in the relational databases, prior work has given techniques to support data encryption and execute SQL queries over the encrypted data. However, the problem of how to put these technique...
详细信息
ISBN:
(纸本)3540253343
To ensure the privacy of data in the relational databases, prior work has given techniques to support data encryption and execute SQL queries over the encrypted data. However, the problem of how to put these techniques together in an optimum manner was not addressed, which is equivalent to having an RDBMS without a query optimizer. this paper models and solves that optimization problem.
A database user session is a sequence of queries issued by a user (or an application) to achieve a certain task. Analysis of task-oriented database user sessions provides useful insight into the query behavior of data...
详细信息
ISBN:
(纸本)3540253343
A database user session is a sequence of queries issued by a user (or an application) to achieve a certain task. Analysis of task-oriented database user sessions provides useful insight into the query behavior of database users. In this paper, we describe novel algorithms for identifying sessions from database traces and for grouping the sessions different classes. We also present experimental results.
Protection of digital assets from piracy has received increasing interests where sensitive, valuable data need to be released. this paper addresses the problem of watermarking spatial trajectory database. the formal d...
详细信息
ISBN:
(纸本)3540253343
Protection of digital assets from piracy has received increasing interests where sensitive, valuable data need to be released. this paper addresses the problem of watermarking spatial trajectory database. the formal definition of the problem is given and the potential attacks are analyzed. then a novel watermarking method is proposed, which embed the watermark information by introducing a small error to the trajectory shape rather than certain data values. Experimental results justify the usefulness of the proposed method, and give some empirical conclusions on the parameter settings.
Recovery processing in embedded real-time databases (ERTDBs) is more complex than traditional databases. In this paper, the classifications and consistency constraints of data and transactions in embedded real-time da...
详细信息
ISBN:
(纸本)3540253343
Recovery processing in embedded real-time databases (ERTDBs) is more complex than traditional databases. In this paper, the classifications and consistency constraints of data and transactions in embedded real-time databases are given first. then time-cognizant recovery principles for different classes of data and transactions are discussed. In terms of these principles, a time-cognizant recovery scheme based on real-time logging is presented, which is suitable for a class of embedded real-time databases applications. Performance evaluations show that the suggested scheme has better performances than traditional recovery techniques in two aspects: the missing deadlines percent of transactions and the time of system denying services after crashes.
In relational databasesystems, traditional normalization techniques (eg, BCNF, 4NF) remove data redundancies from a single relation, but can not detect and remove redundancies, across multiple relations. However, red...
详细信息
ISBN:
(纸本)3540253343
In relational databasesystems, traditional normalization techniques (eg, BCNF, 4NF) remove data redundancies from a single relation, but can not detect and remove redundancies, across multiple relations. However, redundancies among multiple relations are abundant especially in integrated databases. In this paper, we first propose to detect such data redundancies using equality-generating dependencies (EGDs) and propose an extended normal form (ENF) of relational database schema with respect to EGDs. We show that a database has no potential data redundancies with respect to EGDs if and only if the schema is in ENF. For a common special class of EGDs, we provide a set of sound and complete inference rules. A normalization process is presented to losslessly transform a relational database schema to one in ENF. We then extend our EGDs and ENF to XML data, and show how similar data redundancy problems can be detected for data-centric XML documents.
Adapted from the concept of views in databases, workflow views are derived from workflows as a fundamental support for workflow inter-operability and visibility by external parties in a e-service environment. However,...
详细信息
ISBN:
(纸本)3540253343
Adapted from the concept of views in databases, workflow views are derived from workflows as a fundamental support for workflow inter-operability and visibility by external parties in a e-service environment. However, until now there are few works focusing on its realization mechanism, i.e. the communication between views and their source entities. In this paper, we extend the object deputy model to the workflow deputy model supporting the interaction of workflow views in a systematic way. In this workflow deputy model, we formally specify the deputy class and the deputy algebra for workflow classes. According to the process meta-model of XPDL, deputy operations are defined for each kind of workflow component class specifically. Based on this deputy mechanism, workflow views are presented in forms of deputy classes. Lastly, several modeling issues are discussed.
In this paper, a sampling method based on the Metropolis algorithm is proposed. It is able to draw samples that have the same distribution as the underlying probability distribution. It is a simple, efficient, and pow...
详细信息
暂无评论