Search
Skip to Search Results- 5Nascimento, Mario
- 3Oliveira, Stanley
- 3Zaiane, Osmar
- 1Alencar, Romulo
- 1Brayner, Angelo
- 1Chitkara, Vishal
- 8Database Systems
- 2Wireless sensor networks
- 1Access structures
- 1Artifactual Patterns
- 1Bit-string signatures
- 1CBIR
-
2002
Oliveira, Stanley, Zaiane, Osmar
Technical report TR02-13. Discovering hidden patterns from large amounts of data plays an important role in marketing, business, medical analysis, and other applications where these patterns are paramount for strategic decision making. However, recent research has shown that some discovered...
-
2009
Malhotra, Baljeet, Nikolaidis, Ioanis, Nascimento, Mario
Technical report TR09-14. We consider the problem of aggregation convergecast scheduling in wireless sensor networks. Aggregation convergecast differs from regular convergecast in that it accommodates transmission dependencies that allow in-network aggregation to be performed. We formulate the...
-
An Efficient One-Scan Sanitization For Improving The Balance Between Privacy And Knowledge Discovery
Download2003
Oliveira, Stanley, Zaiane, Osmar
Technical report TR03-15. In this paper, we address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting actionable knowledge for strategic decisions, but at the same time not losing the great benefit of association rule mining. To...
-
Benchmarking Access Structures for High-Dimensional Multimedia Data
1999
Nascimento, Mario, Colossi, Nathan
Technical report TR99-05. In multimedia databases it is usual to map objects into feature vectors in high-dimensional spaces. In order to speed query processing access structures, or indices, are required. Unfortunately, in the case of similarity queries, which are in fact nearest neighbor ...
-
Content-Based Image Retrieval Using Binary Signatures
2000
Nascimento, Mario, Chitkara, Vishal, Mastaller, Curt
Technical report TR00-18. Significant research has focused on determining efficient methodologies for retrieving images in large image databases. In this paper, we propose two variations of a new image abstraction technique based on signature bit-strings and an appropriate similarity metric. The...
-
2003
Oliveira, Stanley, Zaiane, Osmar
Technical report TR03-12. Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security, intellectual property rights, and many others. In this paper, we address the privacy problem...
-
On the Trade-Off Between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks
Download2009
Harms, Janelle, Vogt, Ryan, Nascimento, Mario
Technical report TR09-07. By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's location and his/her area of interest. In many domains it is desirable to guarantee privacy of both places. Relying on the principle of k-anonymity, we propose an effective...
-
2009
Alencar, Romulo, Nascimento, Mario, Brayner, Angelo
Technical report TR09-05. It is a well known fact that minimizing energy consumption in Wireless Sensor Networks (WSNs) is crucial for its usability; and minimizing the flow of data is one way to achieve that. Most WSN models assume the existence of a base station where query results could in...