Best position algorithms for top-k queries, VLDB Conf, pp.495-506, 2007. ,
DOI : 10.1016/j.is.2011.03.010
URL : https://hal.archives-ouvertes.fr/inria-00378836
Io-top-k: Index-access optimized top-k query processing, VLDB Conf, pp.475-486, 2006. ,
Public Key Encryption with Keyword Search, International Conference on the Theory and Applications of Cryptographic Techniques, pp.506-522, 2004. ,
DOI : 10.1007/978-3-540-24676-3_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.1462
Privacy Preserving Keyword Searches on Remote Encrypted Data, Applied Cryptography and Network Security (ACNS), pp.442-455, 2005. ,
DOI : 10.1007/11496137_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.6437
Temporal Spatial-Keyword Top-k publish/subscribe, 2015 IEEE 31st International Conference on Data Engineering, pp.255-266, 2015. ,
DOI : 10.1109/ICDE.2015.7113289
Secure kNN Query Processing in Untrusted Cloud Environments, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.11, pp.2818-2831, 2014. ,
DOI : 10.1109/TKDE.2014.2302434
Codes and Ciphers, 2002. ,
DOI : 10.1017/CBO9780511542978
Crowdsourcing for Top-K Query Processing over Uncertain Data, IEEE Transactions on Knowledge and Data Engineering, vol.28, issue.1, pp.41-53, 2016. ,
DOI : 10.1109/TKDE.2015.2462357
URL : http://hdl.handle.net/11311/1004356
Cloud adoption practices and priorities survey report, 2015. ,
Answering top-k queries using views, VLDB Conf, pp.451-462, 2006. ,
Top-k query processing in probabilistic databases with non-materialized views, 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp.122-133, 2013. ,
DOI : 10.1109/ICDE.2013.6544819
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.6740
Secure k-nearest neighbor query over encrypted data in outsourced environments, 2014 IEEE 30th International Conference on Data Engineering, pp.664-675, 2014. ,
DOI : 10.1109/ICDE.2014.6816690
URL : http://arxiv.org/abs/1307.4824
Combining Fuzzy Information from Multiple Systems, Journal of Computer and System Sciences, vol.58, issue.1, pp.83-99, 1999. ,
DOI : 10.1006/jcss.1998.1600
URL : http://doi.org/10.1006/jcss.1998.1600
Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001. ,
DOI : 10.1145/375551.375567
URL : http://arxiv.org/abs/cs/0204046
Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, pp.614-656, 2003. ,
DOI : 10.1145/375551.375567
URL : http://arxiv.org/abs/cs/0204046
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
Towards efficient multi-feature queries in heterogeneous environments, Proceedings International Conference on Information Technology: Coding and Computing, pp.622-628, 2001. ,
DOI : 10.1109/ITCC.2001.918866
Top-K interesting subgraph discovery in information networks, 2014 IEEE 30th International Conference on Data Engineering, pp.820-831, 2014. ,
DOI : 10.1109/ICDE.2014.6816703
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.477.4053
Secure multidimensional range queries over outsourced data, The VLDB Journal, vol.19, issue.3, pp.333-358, 2012. ,
DOI : 10.1007/s00778-011-0245-7
A Privacy-Preserving Index for Range Queries, VLDB Conf, pp.720-731, 2004. ,
DOI : 10.1016/B978-012088469-8.50064-4
Fast top-k path-based relevance query on massive graphs, ICDE Conf, pp.316-327, 2014. ,
DOI : 10.1109/tkde.2015.2509973
Efficient top-k algorithms for approximate substring matching, Proceedings of the 2013 international conference on Management of data, SIGMOD '13, pp.385-396, 2013. ,
DOI : 10.1145/2463676.2465324
Finding and approximating top-k answers in keyword proximity search, Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '06, pp.173-182, 2006. ,
DOI : 10.1145/1142351.1142377
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.541.1967
A data-and workload-aware query answering algorithm for range queries under differential privacy, PVLDB, vol.7, issue.5, pp.341-352, 2014. ,
DOI : 10.14778/2732269.2732271
URL : http://arxiv.org/abs/1410.0265
Fast range query processing with strong privacy protection for cloud computing, PVLDB, vol.7, issue.14, pp.1953-1964, 2014. ,
DOI : 10.14778/2733085.2733100
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.657.7936
KLEE: A framework for distributed top-k query algorithms, VLDB Conf, pp.637-648, 2005. ,
Query processing issues in image (multimedia) databases, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337), pp.22-29, 1999. ,
DOI : 10.1109/ICDE.1999.754894
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.881
Distributed Evaluation of Top-k Temporal Joins, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, pp.1027-1039, 2016. ,
DOI : 10.1145/2882903.2882912
URL : https://hal.archives-ouvertes.fr/hal-01266188
Answering top-k representative queries on graph databases, Proceedings of the 2014 ACM SIGMOD international conference on Management of data, SIGMOD '14, pp.1163-1174, 2014. ,
DOI : 10.1145/2588555.2610524
Description of a new variable-length key, 64-bit block cipher (Blowfish), Fast Software Encryption workshop, p.191 ,
DOI : 10.1007/3-540-58108-1_24
Efficiently Monitoring Top-k Pairs over Sliding Windows, 2012 IEEE 28th International Conference on Data Engineering, pp.798-809, 2012. ,
DOI : 10.1109/ICDE.2012.89
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.409.7448
Top-k Relevant Semantic Place Retrieval on Spatial RDF Data, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, pp.1977-1990, 2016. ,
DOI : 10.1145/2882903.2882941
Finding top-k relevant groups of spatial web objects, The VLDB Journal, vol.16, issue.12, pp.537-555, 2015. ,
DOI : 10.1007/s00778-015-0388-z
Top-k Query Processing in Uncertain Databases, 2007 IEEE 23rd International Conference on Data Engineering, pp.896-905, 2007. ,
DOI : 10.1109/ICDE.2007.367935
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.2589
Top-k oracle: A new way to present top-k tuples for uncertain data, ICDE Conf, pp.146-157, 2013. ,
Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, pp.44-55, 2000. ,
Durable top-k search in document archives, SIGMOD Conf, pp.555-566, 2010. ,
Two birds with one stone: An efficient hierarchical framework for top-k and threshold-based string similarity search, 2015 IEEE 31st International Conference on Data Engineering, pp.519-530, 2015. ,
DOI : 10.1109/ICDE.2015.7113311
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.679.6682
Skype, Proceedings of the VLDB Endowment, vol.9, issue.7, pp.588-599, 2016. ,
DOI : 10.14778/2904483.2904490
Secure kNN computation on encrypted databases, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.139-152, 2009. ,
DOI : 10.1145/1559845.1559862
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.2482
Declarative cleaning of inconsistencies in information extraction. arXiv:1510.05175v2 An efficient top-k query processing framework in mobile sensor networks, Data Knowl. Eng, vol.102, pp.78-95, 2016. ,
Secure nearest neighbor revisited, ICDE Conf, pp.733-744, 2013. ,
Crowdsourced top-k algorithms, Proceedings of the VLDB Endowment, vol.9, issue.8, pp.612-623, 2016. ,
DOI : 10.14778/2921558.2921559