L. Chen, J. Xu, X. Lin, C. S. Jensen, and H. Hu, Answering why-not spatial keyword top-k queries via keyword adaption, 2016 IEEE 32nd International Conference on Data Engineering (ICDE), pp.697-708, 2016.
DOI : 10.1109/ICDE.2016.7498282

S. Choi, G. Ghinita, H. Lim, and E. Bertino, Secure kNN Query Processing in Untrusted Cloud Environments, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.11, pp.2818-2831, 2014.
DOI : 10.1109/TKDE.2014.2302434

F. M. Choudhury, J. S. Culpepper, and T. K. Sellis, Batch processing of Top-k Spatial-textual Queries, Second International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data, GeoRich'15, pp.7-12, 2015.
DOI : 10.1145/2786006.2786008

Y. Elmehdwi, B. K. Samanthula, and W. Jiang, Secure k-nearest neighbor query over encrypted data in outsourced environments, 2014 IEEE 30th International Conference on Data Engineering, pp.664-675, 2014.
DOI : 10.1109/ICDE.2014.6816690

URL : http://arxiv.org/abs/1307.4824

R. Fagin, Combining Fuzzy Information from Multiple Systems, Journal of Computer and System Sciences, vol.58, issue.1, pp.83-99, 1999.
DOI : 10.1006/jcss.1998.1600

URL : http://doi.org/10.1006/jcss.1998.1600

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001.
DOI : 10.1145/375551.375567

URL : http://doi.org/10.1016/s0022-0000(03)00026-6

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, pp.614-656, 2003.
DOI : 10.1145/375551.375567

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

U. Güntzer, W. Balke, and W. Kießling, Towards efficient multi-feature queries in heterogeneous environments, Proceedings International Conference on Information Technology: Coding and Computing, pp.622-628, 2001.
DOI : 10.1109/ITCC.2001.918866

B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, Secure multidimensional range queries over outsourced data, The VLDB Journal, vol.19, issue.3, pp.333-358, 2012.
DOI : 10.1007/s00778-011-0245-7

C. Li, M. Hay, G. Miklau, and Y. Wang, A data-and workload-aware query answering algorithm for range queries under differential privacy, PVLDB, vol.7, issue.5, pp.341-352, 2014.

Z. Shen, M. A. Cheema, X. Lin, W. Zhang, and H. Wang, Efficiently Monitoring Top-k Pairs over Sliding Windows, 2012 IEEE 28th International Conference on Data Engineering, pp.798-809, 2012.
DOI : 10.1109/ICDE.2012.89

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.409.7448

X. Wang, Y. Zhang, W. Zhang, X. Lin, and Z. Huang, Skype, Proceedings of the VLDB Endowment, vol.9, issue.7, pp.588-599, 2016.
DOI : 10.14778/2904483.2904490

H. Z. Xianrui-meng and G. Kollios, Declarative cleaning of inconsistencies in information extraction, 2016.

H. Yang, C. Chung, and M. H. Kim, An efficient top-k query processing framework in mobile sensor networks, Data & Knowledge Engineering, vol.102, pp.78-95, 2016.
DOI : 10.1016/j.datak.2016.02.001

B. Yao, F. Li, and X. Xiao, Secure nearest neighbor revisited, ICDE Conf, pp.733-744, 2013.