R. Akbarinia, E. Pacitti, and P. Valduriez, Best position algorithms for top-k queries, VLDB Conf, pp.495-506, 2007.
DOI : 10.1016/j.is.2011.03.010

URL : https://hal.archives-ouvertes.fr/inria-00378836

H. Bast, D. Majumdar, R. Schenkel, M. Theobald, and G. Weikum, Io-top-k: Index-access optimized top-k query processing, VLDB Conf, pp.475-486, 2006.

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, International Conference on the Theory and Applications of Cryptographic Techniques, pp.506-522, 2004.
DOI : 10.1007/978-3-540-24676-3_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.1462

Y. Chang and M. Mitzenmacher, Privacy Preserving Keyword Searches on Remote Encrypted Data, Applied Cryptography and Network Security (ACNS), pp.442-455, 2005.
DOI : 10.1007/11496137_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.6437

L. Chen, G. Cong, X. Cao, and K. Tan, Temporal Spatial-Keyword Top-k publish/subscribe, 2015 IEEE 31st International Conference on Data Engineering, pp.255-266, 2015.
DOI : 10.1109/ICDE.2015.7113289

S. Choi, G. Ghinita, H. Lim, and E. Bertino, Secure kNN Query Processing in Untrusted Cloud Environments, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.11, pp.2818-2831, 2014.
DOI : 10.1109/TKDE.2014.2302434

R. Churchhouse, Codes and Ciphers, 2002.
DOI : 10.1017/CBO9780511542978

E. Ciceri, P. Fraternali, D. Martinenghi, and M. Tagliasacchi, Crowdsourcing for Top-K Query Processing over Uncertain Data, IEEE Transactions on Knowledge and Data Engineering, vol.28, issue.1, pp.41-53, 2016.
DOI : 10.1109/TKDE.2015.2462357

URL : http://hdl.handle.net/11311/1004356

C. Coles and J. Yeoh, Cloud adoption practices and priorities survey report, 2015.

G. Das, D. Gunopulos, N. Koudas, and D. Tsirogiannis, Answering top-k queries using views, VLDB Conf, pp.451-462, 2006.

M. Dylla, I. Miliaraki, and M. Theobald, Top-k query processing in probabilistic databases with non-materialized views, 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp.122-133, 2013.
DOI : 10.1109/ICDE.2013.6544819

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.6740

Y. Elmehdwi, B. K. Samanthula, and W. Jiang, Secure k-nearest neighbor query over encrypted data in outsourced environments, 2014 IEEE 30th International Conference on Data Engineering, pp.664-675, 2014.
DOI : 10.1109/ICDE.2014.6816690

URL : http://arxiv.org/abs/1307.4824

R. Fagin, Combining Fuzzy Information from Multiple Systems, Journal of Computer and System Sciences, vol.58, issue.1, pp.83-99, 1999.
DOI : 10.1006/jcss.1998.1600

URL : http://doi.org/10.1006/jcss.1998.1600

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001.
DOI : 10.1145/375551.375567

URL : http://arxiv.org/abs/cs/0204046

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, pp.614-656, 2003.
DOI : 10.1145/375551.375567

URL : http://arxiv.org/abs/cs/0204046

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592

U. Güntzer, W. Balke, and W. Kießling, Towards efficient multi-feature queries in heterogeneous environments, Proceedings International Conference on Information Technology: Coding and Computing, pp.622-628, 2001.
DOI : 10.1109/ITCC.2001.918866

M. Gupta, J. Gao, X. Yan, H. Cam, and J. Han, Top-K interesting subgraph discovery in information networks, 2014 IEEE 30th International Conference on Data Engineering, pp.820-831, 2014.
DOI : 10.1109/ICDE.2014.6816703

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.477.4053

B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, Secure multidimensional range queries over outsourced data, The VLDB Journal, vol.19, issue.3, pp.333-358, 2012.
DOI : 10.1007/s00778-011-0245-7

B. Hore, S. Mehrotra, and G. Tsudik, A Privacy-Preserving Index for Range Queries, VLDB Conf, pp.720-731, 2004.
DOI : 10.1016/B978-012088469-8.50064-4

S. Khemmarat and L. Gao, Fast top-k path-based relevance query on massive graphs, ICDE Conf, pp.316-327, 2014.
DOI : 10.1109/tkde.2015.2509973

Y. Kim and K. Shim, Efficient top-k algorithms for approximate substring matching, Proceedings of the 2013 international conference on Management of data, SIGMOD '13, pp.385-396, 2013.
DOI : 10.1145/2463676.2465324

B. Kimelfeld and Y. Sagiv, Finding and approximating top-k answers in keyword proximity search, Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '06, pp.173-182, 2006.
DOI : 10.1145/1142351.1142377

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.541.1967

C. Li, M. Hay, G. Miklau, and Y. Wang, A data-and workload-aware query answering algorithm for range queries under differential privacy, PVLDB, vol.7, issue.5, pp.341-352, 2014.
DOI : 10.14778/2732269.2732271

URL : http://arxiv.org/abs/1410.0265

R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar, Fast range query processing with strong privacy protection for cloud computing, PVLDB, vol.7, issue.14, pp.1953-1964, 2014.
DOI : 10.14778/2733085.2733100

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.657.7936

S. Michel, P. Triantafillou, and G. Weikum, KLEE: A framework for distributed top-k query algorithms, VLDB Conf, pp.637-648, 2005.

S. Nepal and M. V. Ramakrishna, Query processing issues in image (multimedia) databases, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337), pp.22-29, 1999.
DOI : 10.1109/ICDE.1999.754894

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.881

J. Pilourdault, V. Leroy, and S. Amer-yahia, Distributed Evaluation of Top-k Temporal Joins, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, pp.1027-1039, 2016.
DOI : 10.1145/2882903.2882912

URL : https://hal.archives-ouvertes.fr/hal-01266188

S. Ranu, M. X. Hoang, and A. K. Singh, Answering top-k representative queries on graph databases, Proceedings of the 2014 ACM SIGMOD international conference on Management of data, SIGMOD '14, pp.1163-1174, 2014.
DOI : 10.1145/2588555.2610524

B. Schneier, Description of a new variable-length key, 64-bit block cipher (Blowfish), Fast Software Encryption workshop, p.191
DOI : 10.1007/3-540-58108-1_24

Z. Shen, M. A. Cheema, X. Lin, W. Zhang, and H. Wang, Efficiently Monitoring Top-k Pairs over Sliding Windows, 2012 IEEE 28th International Conference on Data Engineering, pp.798-809, 2012.
DOI : 10.1109/ICDE.2012.89

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.409.7448

J. Shi, D. Wu, and N. Mamoulis, Top-k Relevant Semantic Place Retrieval on Spatial RDF Data, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, pp.1977-1990, 2016.
DOI : 10.1145/2882903.2882941

A. Skovsgaard and C. S. Jensen, Finding top-k relevant groups of spatial web objects, The VLDB Journal, vol.16, issue.12, pp.537-555, 2015.
DOI : 10.1007/s00778-015-0388-z

M. A. Soliman, I. F. Ilyas, and K. C. Chang, Top-k Query Processing in Uncertain Databases, 2007 IEEE 23rd International Conference on Data Engineering, pp.896-905, 2007.
DOI : 10.1109/ICDE.2007.367935

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.2589

C. Song, Z. Li, and T. Ge, Top-k oracle: A new way to present top-k tuples for uncertain data, ICDE Conf, pp.146-157, 2013.

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, pp.44-55, 2000.

L. H. , N. Mamoulis, K. Berberich, and S. J. Bedathur, Durable top-k search in document archives, SIGMOD Conf, pp.555-566, 2010.

J. Wang, G. Li, D. Deng, Y. Zhang, and J. Feng, Two birds with one stone: An efficient hierarchical framework for top-k and threshold-based string similarity search, 2015 IEEE 31st International Conference on Data Engineering, pp.519-530, 2015.
DOI : 10.1109/ICDE.2015.7113311

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.679.6682

X. Wang, Y. Zhang, W. Zhang, X. Lin, and Z. Huang, Skype, Proceedings of the VLDB Endowment, vol.9, issue.7, pp.588-599, 2016.
DOI : 10.14778/2904483.2904490

W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, Secure kNN computation on encrypted databases, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.139-152, 2009.
DOI : 10.1145/1559845.1559862

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.2482

H. Z. Xianrui-meng, G. Kollios, H. Yang, C. Chung, and M. H. Kim, Declarative cleaning of inconsistencies in information extraction. arXiv:1510.05175v2 An efficient top-k query processing framework in mobile sensor networks, Data Knowl. Eng, vol.102, pp.78-95, 2016.

B. Yao, F. Li, and X. Xiao, Secure nearest neighbor revisited, ICDE Conf, pp.733-744, 2013.

X. Zhang, G. Li, and J. Feng, Crowdsourced top-k algorithms, Proceedings of the VLDB Endowment, vol.9, issue.8, pp.612-623, 2016.
DOI : 10.14778/2921558.2921559