吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (01): 164-170.doi: 10.13229/j.cnki.jdxbgxb201401028
• paper • Previous Articles Next Articles
SHENG Gang1, WEN Tao1, GUO Quan2, YIN Ying3
CLC Number:
[1] Ilyas Ihab F, Beskales George, Soliman Mohamed A. A survey of top-k query processing techniques in relational database systems[J]. ACM Computing Surveys, 2008, 40(4):1-58.[2] Chang Yuan-chi, Lawrence Bergman, Vittorio Castelli, et al. The onion technique: indexing for linear optimization queries[C]//Proc of the 2000 ACM SIGMOD, New York: ACM, 2000:391-402.[3] Hristidis Vagelis, Koudas Nick, Papakonstantinou Yannis. Prefer:a system for the efficient execution of multi-parametric ranked queries[C]//Proc of the 2001 ACM SIGMOD, New York: ACM, 2001: 259-270.[4] Zou Lei, Chen Lei. Dominant graph: an efficient indexing structure to answer top-k queries[C]//Proc of the 24th ICDE, Washington: IEEE Computer Society, 2008:536-545.[5] Hacigumus H, Iyer B R, Mehrotra S. Providing database as a service[C]//Proc of the 18th ICDE. Washingtong: IEEE Computer Society, 2002: 29-40.[6] Merkle R. A certified digital signature[C]//Advance in Cryptology-Crypto'89, Berlin: Springer, LNCS 435, 1990: 218-238.[7] Premkumar Devanbu, Michael Gertz, Charles Martel, et al. Authentic data publication over the internet[J]. Journal of Computer Security, 2003, 11(3):291-314.[8] Xie Min, Wang Hai-xun, Yin Jian, et al. Integrity auditing of outsourced data[C]//Proc of the 33rd VLDB, New York: ACM, 2007: 782-793.[9] 张敏, 洪澄, 陈驰. 一种服务器透明的外包数据库查询验证方案[J]. 计算机研究与发展, 2010, 47(1):182-190. Zhang Min, Hong Cheng, Chen Chi. Server transparent query authentication of outsourced database[J]. Journal of Computer Research and Development, 2010, 47(1):182-190.[10] 咸鹤群, 冯登国. 外包数据库模型中的完整性检测方案[J].计算机研究与发展, 2010, 47(6):1107-1115. Xian He-qun, Feng Deng-guo. An integrity checking scheme in outsourced database model[J]. Journal of Computer Research and Development, 2010, 47(6):1107-1115.[11] 温涛, 盛刚, 郭权, 等. 追加型数据库外包中的查询结果验证[J]. 计算机研究与发展, 2012, 49(10):2077-2085. Wen Tao, Sheng Gang, Guo Quan, et al. Query results authentication of outsourced append-only databases[J]. Journal of Computer Research and Development, 2012, 49(10): 2077-2085.[12] Yang Yin, Stavros Papadopoulos, Dimitris Papadias, et al. Authenticated indexing for outsourced spatial databases[J]. The VLDB Journal, 2009, 18(3):631-648.[13] Stavros Papadopoulos, Wang Li-xing, Yang Yin, et al. Authenticated multi-step nearest neighbor search[J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(5): 641-654.[14] Stavros Papadopoulos, Yang Yin, Dimitris Papadias. Continuous authentication on relational streams[J]. The VLDB Journal, 2010, 19(2): 161-180. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|