Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.
Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and...
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns t...
In recent years, a new class of applications has come to the forefront { p- marily due to the advancement in our ability to collect data from multitudes of devices, and process them e ciently. These include homeland security - plications, sensor/pervasive computing applications, various kinds of mo- toring applications, and even traditional applications belonging to nancial, computer network management, and telecommunication domains. These - plications need to process data continuously (and as long as data is available) from one or more sources. The sequence of data items continuously gen-...
In recent years, a new class of applications has come to the forefront { p- marily due to the advancement in our ability to collect data from multitud...
Managing and Mining Graph Data is a comprehensive survey book in graph data analytics. It contains extensive surveys on important graph topics such as graph languages, indexing, clustering, data generation, pattern mining, classification, keyword search, pattern matching, and privacy. It also studies a number of domain-specific scenarios such as stream mining, web graphs, social networks, chemical and biological data. The chapters are written by leading researchers, and provide a broad perspective of the area. This is the first comprehensive survey book in the emerging topic of...
Managing and Mining Graph Data is a comprehensive survey book in graph data analytics. It contains extensive surveys on important graph to...
Transaction processing is an established technique for the concurrent and fault tolerant access of persistent data. While this technique has been successful in standard database systems, factors such as time-critical applications, emerg ing technologies, and a re-examination of existing systems suggest that the performance, functionality and applicability of transactions may be substan tially enhanced if temporal considerations are taken into account. That is, transactions should not only execute in a "legal" (i.e., logically correct) man ner, but they should meet certain constraints with...
Transaction processing is an established technique for the concurrent and fault tolerant access of persistent data. While this technique has been succ...
Searching Multimedia Databases by Content bridges the gap between the database and signal processing communities by providing the necessary background information for the reader and presenting it along with the intuition and mechanics of the best existing tools in each area. The first half of Searching Multimedia Databases by Content reviews the most successful database access methods, in increasing complexity, reaching up to spatial access methods and text retrieval. In all cases, the emphasis is on practical approaches that have been incorporated in commercial...
Searching Multimedia Databases by Content bridges the gap between the database and signal processing communities by providing the necessary b...
Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely investigated by a new research domain, the so-called privacy preserving data mining. Association rule hiding is a new technique on data mining, which studies the problem of hiding sensitive association rules from within the data. Association Rule Hiding for Data Mining addresses the optimization problem of "hiding" sensitive association rules which due to its combinatorial nature admits a number of heuristic solutions that will be proposed and...
Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely ...
Advanced Database Indexing begins by introducing basic material on storage media, including magnetic disks, RAID systems and tertiary storage such as optical disk and tapes. Typical access methods (e.g. B+ trees, dynamic hash files and secondary key retrieval) are also introduced. The remainder of the book discusses recent advances in indexing and access methods for particular database applications. More specifically, issues such as external sorting, file structures for intervals, temporal access methods, spatial and spatio-temporal indexing, image and multimedia indexing,...
Advanced Database Indexing begins by introducing basic material on storage media, including magnetic disks, RAID systems and tertiary storage...
Advanced Signature Indexing for Multimedia and Web Applications presents the latest research developments in signature-based indexing and query processing, specifically in multimedia and Web domains. These domains now demand a different designation of hashing information in bit-strings (i.e., signatures), and new indexes and query processing methods. The book provides solutions to these issues and addresses the resulting requirements, which are not adequately handled by existing approaches. Examples of these applications include: searching for similar images, representing...
Advanced Signature Indexing for Multimedia and Web Applications presents the latest research developments in signature-based index...
Geographic Information Systems (GIS) have been experiencing a steady and unprecedented growth in terms of general interest, theory development, and new applications in the last decade or so. GIS is an inter-disciplinary field that brings together many diverse areas such as computer science, geography, cartography, engineering, and urban planning. Database Issues in Geographic Information Systems approaches several important topics in GIS from a database perspective. Database management has a central role to play in most computer-based information systems, and is expected to...
Geographic Information Systems (GIS) have been experiencing a steady and unprecedented growth in terms of general interest, theory development, and ne...
In a global and increasingly competitive market, where organizations are driven by information, the search for ways to transform data into true knowledge is critical to a business's success. Few companies, however, have effective methods of managing the quality of this information. Because quality is a multidimensional concept, its management must consider a wide variety of issues related to information and data quality. Information and Database Quality is a compilation of works from research and industry that examines these issues, covering both the organizational and technical...
In a global and increasingly competitive market, where organizations are driven by information, the search for ways to transform data into true knowle...