Sort by:
Keyphrases
#P-hard
5%
Accuracy Improvement
5%
Adjacency Matrix
5%
Adversary
5%
Aggregate Query
46%
Approximation Algorithms
5%
Approximation Guarantee
11%
As-a-service
10%
Authentication Mechanism
15%
Brute Force
5%
Business Intelligence
10%
Cloud Computing
10%
Cohesion
7%
Community Search
23%
Computation Time
5%
Computational Hardness
5%
Computing Technology
5%
Confidentiality
51%
Constrained Concave-convex Procedure
5%
Crowdsourcing
11%
Cyclic Group
11%
Data Cleaning
23%
Data Confidentiality
10%
Data Mining Tasks
5%
Data Owner
10%
Data Publication
26%
Data Sharing
5%
Data Summarization
23%
Data Suppression
6%
Data Update
6%
Density-based
23%
Dependency Graph
11%
Descriptive Text
11%
Design Techniques
7%
Detour
7%
Differential Privacy
17%
Differentially Private
46%
Distance Similarity
11%
Distribution-based
5%
Edge Selection
11%
Edge-based Method
7%
Elapsed Time
5%
Encryption
5%
Encryption Algorithm
5%
Environmental Friendliness
7%
Error Bound
23%
Existential Probability
5%
Existing Techniques
11%
Extended Abstracts
23%
Filtering Framework
23%
Frequent Subgraphs
5%
Fundamental Class
5%
Gene Ontology
11%
Geo-social Data
5%
Geosocial
26%
Geotag
11%
Graph Database
34%
Graph Isomorphism
17%
Graph Model
28%
Graph Network
5%
Graph Query
17%
Graph Visualization
23%
Greedy Algorithm
11%
Grid-based Method
7%
Group Query
46%
Group-based
11%
High-dimensional Data
23%
Human Power
23%
Index Structure
5%
Index Traversal
11%
Index-based
11%
Individual Privacy
7%
Integer Programming
5%
International Classification of Diseases
11%
Internet Access
5%
Internet of Healthcare Things (IoHT)
5%
Isomorphism Class
5%
Joint Distribution
11%
Junction Tree Algorithm
5%
K-Cover
23%
Keyword Set
11%
Knowledge Graph
11%
Large Graphs
23%
Location Factors
5%
Location Information
5%
Location-aware
5%
Logic Unit
5%
Marginal Table
5%
Massive Data
5%
Matrix Operation
11%
Medical Subject Headings (MeSH)
11%
Minimizing Errors
5%
Missing Object
23%
Mobile Devices
5%
Mobile Platform
5%
Modeling Algorithm
23%
Monetary Cost
5%
Mouse Click
5%
Network Data
23%
Network Datasets
5%
Network Traffic
6%
New York City
7%
Novel Index
15%
Novel Solutions
5%
NP-complete
5%
NP-hard
9%
O-Cost
11%
Online Social Networks
5%
Ontological Basis
23%
Ontology Structure
11%
Optimization Techniques
5%
Parameter Setting
5%
Performance Evaluation
5%
Personal Information
5%
Popular
11%
Practical Usefulness
9%
Privacy Guarantees
9%
Privacy-preserving
5%
Privacy-preserving Authentication
13%
Probabilistic Reachability
23%
Pruning Heuristics
5%
Pruning Strategy
9%
Quality of Service
5%
Query Authentication
10%
Query Auto-completion
23%
Query Formulation
11%
Query Graph
5%
Query Intent
11%
Query Keyword
23%
Query Point
11%
Query Processing
21%
Query Result
20%
Query Services
56%
Query Suggestion
17%
Random Selection
5%
Ranking Queries
5%
Rapid Development
5%
Reachability Query
23%
Real Users
5%
Real-life Dataset
5%
Real-world Application
5%
Recent Advances
10%
Ride-sharing Services
23%
Ridesharing
30%
Route Planning
7%
Sampling Methods
5%
Sampling-based Inference
23%
Scoring Function
11%
Selecting Candidates
7%
Selection Algorithm
5%
Selection Problem
5%
Sensor Data Collection
23%
Service Provider
10%
Service Region
5%
Set-valued Data
46%
Shared Services
7%
Shared Taxi
7%
Social Awareness
7%
Social Computing
5%
Social Data
5%
Social Distance
7%
Social Factors
5%
Social Good
5%
Social Networks
14%
Social Query
5%
Social-aware
46%
Source Data
10%
Spatial Distance
11%
Spatial Keyword
23%
Spatial Processing
23%
Static Measurement
5%
Structural Information
13%
Structure Optimization
5%
Structure Preservation
23%
Subgraph Query
28%
Sweeper
23%
Synthetic Data
5%
System Framework
7%
Taxi Recommendation
23%
Text Document
11%
Text Similarity
11%
Third-party Providers
5%
Threshold Mechanism
5%
Time-based
7%
Top-k Query
23%
Travel Time
7%
Ubiquitous Internet
5%
Ullmann
5%
Uncertain Graph
23%
Urban Areas
7%
User Groups
5%
User Issues
11%
User Preference
5%
Via Density
23%
Visual Query
23%
Web Objects
11%
Why-not
23%
Why-questions
23%
Computer Science
Adjacency Matrix
11%
Air Pollution
23%
Application Area
23%
Approximation (Algorithm)
7%
Approximation Algorithm
7%
Authentication
15%
Authentication Protocol
7%
Authentication Technique
38%
Background Knowledge
7%
Building-Blocks
7%
Business Intelligence
30%
Cloud Computing
30%
Collaboration and Communication
23%
Communication Network
23%
Community Detection
23%
Computation Time
23%
Computing Technology
23%
Data Cleaning
23%
Data Confidentiality
30%
Data Mining Task
7%
Data Publication
30%
Data Sharing
7%
Decision Making
30%
Dependency Graph
15%
Design Technique
23%
Differential Privacy
30%
Efficient Algorithm
46%
Encryption Method
7%
Experimental Result
100%
Frequent Subgraph
23%
Fundamental Problem
7%
Future Direction
23%
Graph Database
38%
Greedy Algorithm
7%
High Dimensional Data
23%
Index Structure
23%
Individual Privacy
11%
Input/Output
23%
Integer Programming
7%
Interactive
7%
Internet Access
23%
Joint Distribution
15%
Knowledge Graph
23%
Lagrangian Relaxation
11%
Location Data
23%
Matrix Operation
15%
Mobile Device
23%
Mobile Platform
23%
Network Community
23%
Network Configuration
11%
Network Protocols
11%
Network Traffic
23%
Online Social Network
23%
Ontology
23%
Optimization Technique
23%
Performance Evaluation
23%
Personal Information
23%
Privacy Breach
7%
Privacy Preservation
7%
Privacy Preserving
23%
Problem Selection
23%
Quality of Service
7%
Query Processing
69%
Random Selection
23%
Rapid Development
23%
Scoring Function
23%
Security Analysis
7%
Sensor Network
11%
Sensor Node
11%
Service Provider
30%
Social Computing
23%
Social Connection
23%
Social Distance
23%
Social Network
69%
Social Networking Site
7%
Spatial Proximity
23%
Speed-up
46%
Subgraph Isomorphism
23%
Subgraphs
46%
Subject Heading
7%
Synthetic Datasets
7%
Systems and Application
7%
Tree Algorithm
7%
User Preference
23%
Wireless Sensor Network
11%
World Application
23%