Travelled to:
1 × Australia
1 × Austria
1 × Canada
1 × Chile
1 × China
1 × France
1 × Norway
1 × Portugal
12 × USA
Collaborated with:
R.C.Wong K.Wang J.Pei J.Cheng Y.Xu Y.Bu L.Chen S.Huang M.Jiang J.Li H.Wu M.H.Yan F.H.Luk H.Hwang D.W.Cheung T.Kameda P.S.Yu R.Liu J.Wang J.Liu F.M.Jiang C.H.Cheng Y.Zhang Y.Xu C.Long G.Yang D.Liu W.Rao Y.Tao X.Xiao E.J.Keogh L.Y.H.Lau C.(.Ratanamahatana Y.Ke J.X.Yu L.Zhu M.T.Özsu L.Liu M.Hua X.Lin H.Leung R.She Y.S.Ho T.Wong Y.Liu J.Xu W.Wang X.Wang B.Shi H.He J.Chen H.Jin D.McAullay G.J.Williams R.Sparks C.Kelman
Talks about:
data (8) queri (7) effici (6) network (5) anonym (5) label (5) privaci (4) preserv (4) databas (4) point (4)
Person: Ada Wai-Chee Fu
DBLP: Fu:Ada_Wai=Chee
Contributed to:
Wrote 32 papers:
- SIGMOD-2015-HuangFL #graph
- Minimum Spanning Trees in Temporal Graphs (SH, AWCF, RL), pp. 419–430.
- SIGMOD-2015-JiangFW #keyword #network #scalability
- Exact Top-k Nearest Keyword Search in Large Networks (MJ, AWCF, RCWW), pp. 393–404.
- VLDB-2014-JiangFWX #distance #network #query
- Hop Doubling Label Indexing for Point-to-Point Distance Querying on Scale-Free Networks (MJ, AWCF, RCWW, YX), pp. 1203–1214.
- KDD-2013-WangCF #clique
- Redundancy-aware maximal cliques (JW, JC, AWCF), pp. 122–130.
- SIGMOD-2013-ChengHWF #graph #named #query #reachability #scalability
- TF-Label: a topological-folding labeling scheme for reachability querying in a large graph (JC, SH, HW, AWCF), pp. 193–204.
- SIGMOD-2013-LongWWF #approach #distance #keyword #query
- Collective spatial keyword queries: a distance owner-driven approach (CL, RCWW, KW, AWCF), pp. 689–700.
- VLDB-2013-FuWCW #distance #named #query
- IS-LABEL: an Independent-Set based Labeling Scheme for Point-to-Point Distance Querying (AWCF, HW, JC, RCWW), pp. 457–468.
- SIGMOD-2010-ChengFL #morphism #named #network #privacy
- K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
- SIGMOD-2010-ChengKFYZ #clique #network
- Finding maximal cliques in massive networks by H*-graph (JC, YK, AWCF, JXY, LZ), pp. 447–458.
- CIKM-2009-XuWYF #online #personalisation #web #web service
- Online anonymity for personalized web services (YX, KW, GY, AWCF), pp. 1497–1500.
- KDD-2009-BuCFL #monitoring #performance
- Efficient anomaly monitoring over moving object trajectory streams (YB, LC, AWCF, DL), pp. 159–168.
- VLDB-2009-WongOYFL #nearest neighbour #performance
- Efficient Method for Maximizing Bichromatic Reverse Nearest Neighbor (RCWW, MTÖ, PSY, AWCF, LL), pp. 1126–1137.
- KDD-2008-XuWFY #database #transaction
- Anonymizing transaction databases for publication (YX, KW, AWCF, PSY), pp. 767–775.
- VLDB-2008-BuFWCL #composition #privacy
- Privacy preserving serial data publishing by role composition (YB, AWCF, RCWW, LC, JL), pp. 845–856.
- VLDB-2008-WongFPHWL #performance #query
- Efficient skyline querying with variable user preferences on nominal attributes (RCWW, AWCF, JP, YSH, TW, YL), pp. 1032–1043.
- CIKM-2007-JiangPF #named #xml
- Ix-cubes: iceberg cubes for data warehousing and olap on xml data (FMfJ, JP, AWCF), pp. 905–908.
- CIKM-2007-RaoCFB #analysis #network #peer-to-peer
- Optimal proactive caching in peer-to-peer network: analysis and application (WR, LC, AWCF, YB), pp. 663–672.
- KDD-2007-WongFPW #mining
- Mining favorable facets (RCWW, JP, AWCF, KW), pp. 804–813.
- VLDB-2007-HuaPFLL #database #query #scalability
- Efficiently Answering Top-k Typicality Queries on Large Databases (MH, JP, AWCF, XL, HfL), pp. 890–901.
- VLDB-2007-WongFWP #privacy
- Minimality Attack in Privacy Preserving Data Publishing (RCWW, AWCF, KW, JP), pp. 543–554.
- VLDB-2007-WongTFX #on the #performance
- On Efficient Spatial Matching (RCWW, YT, AWCF, XX), pp. 579–590.
- CIKM-2006-XuWFSP #classification #correlation #data type
- Classification spanning correlated data streams (YX, KW, AWCF, RS, JP), pp. 132–141.
- KDD-2006-WongLFW #privacy
- (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
- KDD-2006-XuWPWSF #using
- Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
- KDD-2005-LiFHCJMWSK #mining
- Mining risk patterns in medical data (JL, AWCF, HH, JC, HJ, DM, GJW, RS, CK), pp. 770–775.
- VLDB-2005-FuKLR #query #scalability
- Scaling and Time Warping in Time Series Querying (AWCF, EJK, LYHL, C(R), pp. 649–660.
- CIKM-2001-YanF #algorithm #dependence #multi
- Algorithm for Discovering Multivalued Dependencies (MHY, AWCF), pp. 556–558.
- KDD-1999-ChengFZ #clustering #mining
- Entropy-based Subspace Clustering for Mining Numerical Data (CHC, AWCF, YZ), pp. 84–93.
- CIKM-1998-LukF #database #object-oriented
- Triple-Node Hierarchies for Object-Oriented Database Indexing (FHWL, AWCF), pp. 386–397.
- KDD-1995-HwangF #algorithm #induction #performance
- Efficient Algorithms for Attribute-Oriented Induction (HYH, AWCF), pp. 168–173.
- VLDB-1994-FuC #database #replication #transaction
- A Transaction Replication Scheme for a Replicated Database with Node Autonomy (AWCF, DWLC), pp. 214–225.
- PODS-1989-FuK #concurrent #transaction
- Concurrency Control of Nested Transactions Accessing B-Trees (AWCF, TK), pp. 270–285.