Answering why-not spatial keyword top-k queries via keyword adaption, 2016 IEEE 32nd International Conference on Data Engineering (ICDE), pp.697-708, 2016. ,
DOI : 10.1109/ICDE.2016.7498282
Secure kNN Query Processing in Untrusted Cloud Environments, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.11, pp.2818-2831, 2014. ,
DOI : 10.1109/TKDE.2014.2302434
Batch processing of Top-k Spatial-textual Queries, Second International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data, GeoRich'15, pp.7-12, 2015. ,
DOI : 10.1145/2786006.2786008
Secure k-nearest neighbor query over encrypted data in outsourced environments, 2014 IEEE 30th International Conference on Data Engineering, pp.664-675, 2014. ,
DOI : 10.1109/ICDE.2014.6816690
URL : http://arxiv.org/abs/1307.4824
Combining Fuzzy Information from Multiple Systems, Journal of Computer and System Sciences, vol.58, issue.1, pp.83-99, 1999. ,
DOI : 10.1006/jcss.1998.1600
URL : http://doi.org/10.1006/jcss.1998.1600
Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001. ,
DOI : 10.1145/375551.375567
URL : http://doi.org/10.1016/s0022-0000(03)00026-6
Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, pp.614-656, 2003. ,
DOI : 10.1145/375551.375567
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
Towards efficient multi-feature queries in heterogeneous environments, Proceedings International Conference on Information Technology: Coding and Computing, pp.622-628, 2001. ,
DOI : 10.1109/ITCC.2001.918866
Secure multidimensional range queries over outsourced data, The VLDB Journal, vol.19, issue.3, pp.333-358, 2012. ,
DOI : 10.1007/s00778-011-0245-7
A data-and workload-aware query answering algorithm for range queries under differential privacy, PVLDB, vol.7, issue.5, pp.341-352, 2014. ,
Efficiently Monitoring Top-k Pairs over Sliding Windows, 2012 IEEE 28th International Conference on Data Engineering, pp.798-809, 2012. ,
DOI : 10.1109/ICDE.2012.89
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.409.7448
Skype, Proceedings of the VLDB Endowment, vol.9, issue.7, pp.588-599, 2016. ,
DOI : 10.14778/2904483.2904490
Declarative cleaning of inconsistencies in information extraction, 2016. ,
An efficient top-k query processing framework in mobile sensor networks, Data & Knowledge Engineering, vol.102, pp.78-95, 2016. ,
DOI : 10.1016/j.datak.2016.02.001
Secure nearest neighbor revisited, ICDE Conf, pp.733-744, 2013. ,