{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:00Z","timestamp":1742913960001,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319119328"},{"type":"electronic","value":"9783319119335"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-11933-5_7","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T04:19:15Z","timestamp":1413519555000},"page":"51-58","source":"Crossref","is-referenced-by-count":0,"title":["Improving Query Processing Performance Using Optimization among CPEL Factors"],"prefix":"10.1007","author":[{"given":"R. Kiran","family":"Kumar","sequence":"first","affiliation":[]},{"given":"K.","family":"Suresh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of ACM SIGMOD Conference (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Chen, K., Kavuluru, R., Guo, S.: Rasp: Efficient multidimensional range query on attack-resilient encrypted databases. In: ACM Conference on Data and Application Security and Privacy, pp. 249\u2013260 (2011)","DOI":"10.1145\/1943513.1943547"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of Very Large Databases Conference, VLDB (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"7_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/11871637_30","volume-title":"Knowledge Discovery in Databases: PKDD 2006","author":"K. Liu","year":"2006","unstructured":"Liu, K., Giannella, C.M., Kargupta, H.: An attacker\u2019s view of distance preserving maps for privacy preserving data mining. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol.\u00a04213, pp. 297\u2013308. Springer, Heidelberg (2006)"},{"issue":"6","key":"7_CR5","first-page":"965","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. ACM Computer Survey\u00a045(6), 965\u2013981 (1998)","journal-title":"ACM Computer Survey"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In: ACM Conference on Computer and Communications Security (2008)","DOI":"10.1145\/1455770.1455790"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of IEEE International Conference on Data Engineering (ICDE), pp. 601\u2013612 (2011)","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. In: Proceedings of Very Large Databases Conference, VLDB (2010)","DOI":"10.14778\/1920841.1920920"},{"key":"7_CR9","volume-title":"Adaptation in Natural and Artificial Systems","author":"J.H. Holland","year":"1975","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor (1975)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Haupt, R.L., Haupt, S.E.: Practical Genetic Algorithms. John Wiley & Sons, Inc., New Jersey (2004)","DOI":"10.1002\/0471671746"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45061-0_6","volume-title":"Automata, Languages and Programming","author":"M. Vardi","year":"2003","unstructured":"Vardi, M.: Logic and automata: A match made in heaven. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, Springer, Heidelberg (2003)"},{"issue":"1","key":"7_CR12","first-page":"49","volume":"5","author":"R. Tan","year":"1997","unstructured":"Tan, R.: Seeking the profitability-risk-competitiveness frontier using a genetic algorithm. Journal of Actuarial Practice\u00a05(1), 49 (1997)","journal-title":"Journal of Actuarial Practice"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11933-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T04:18:45Z","timestamp":1675829925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11933-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319119328","9783319119335"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11933-5_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}