Sciweavers

PVLDB
2016
91views Cryptology» more  PVLDB 2016»
10 years 22 days ago
LEOPARD: Lightweight Edge-Oriented Partitioning and Replication for Dynamic Graphs
This paper introduces a dynamic graph partitioning algorithm, designed for large, constantly changing graphs. We propose a partitioning framework that adjusts on the fly as the g...
Jiewen Huang, Daniel Abadi
PVLDB
2016
63views Cryptology» more  PVLDB 2016»
10 years 22 days ago
Repairing Data through Regular Expressions
Since regular expressions are often used to detect errors in sequences such as strings or date, it is natural to use them for data repair. Motivated by this, we propose a data rep...
Zeyu Li, Hongzhi Wang, Wei Shao, Jianzhong Li, Hon...
PVLDB
2016
72views Cryptology» more  PVLDB 2016»
10 years 22 days ago
A Shifting Bloom Filter Framework for Set Queries
Set queries are fundamental operations in computer systems and applications. This paper addresses the fundamental problem of designing a probabilistic data structure that can quic...
Tong Yang, Alex X. Liu, Muhammad Shahzad, Yuankun ...
PVLDB
2016
80views Cryptology» more  PVLDB 2016»
10 years 22 days ago
Inferray: fast in-memory RDF inference
The advent of semantic data on the Web requires efficient reasoning systems to infer RDF and OWL data. The linked nature and the huge volume of data entail efficiency and scalabil...
Julien Subercaze, Christophe Gravier, Jules Cheval...
PVLDB
2016
77views Cryptology» more  PVLDB 2016»
10 years 22 days ago
SlimShot: In-Database Probabilistic Inference for Knowledge Bases
Increasingly large Knowledge Bases are being created, by crawling the Web or other corpora of documents, and by extracting facts and relations using machine learning techniques. T...
Eric Gribkoff, Dan Suciu
PVLDB
2016
121views Cryptology» more  PVLDB 2016»
10 years 22 days ago
BCC: Reducing False Aborts in Optimistic Concurrency Control with Low Cost for In-Memory Databases
The Optimistic Concurrency Control (OCC) method has been commonly used for in-memory databases to ensure transaction serializability — a transaction will be aborted if its read ...
Yuan Yuan, Kaibo Wang, Rubao Lee, Xiaoning Ding, J...
PVLDB
2016
74views Cryptology» more  PVLDB 2016»
10 years 22 days ago
Exploiting Equality Generating Dependencies in Checking Chase Termination
The chase is a well-known algorithm with a wide range of applications in data exchange, data cleaning, data integration, query optimization, and ontological reasoning. Since the c...
Marco Calautti, Sergio Greco, Cristian Molinaro, I...
PVLDB
2016
108views Cryptology» more  PVLDB 2016»
10 years 22 days ago
A General-Purpose Query-Centric Framework for Querying Big Graphs
Pioneered by Google’s Pregel, many distributed systems have been developed for large-scale graph analytics. These systems employ a user-friendly “think like a vertex” progra...
Da Yan, James Cheng, M. Tamer Özsu, Fan Yang,...
PVLDB
2016
79views Cryptology» more  PVLDB 2016»
10 years 22 days ago
Scalable Package Queries in Relational Database Systems
Traditional database queries follow a simple model: they define constraints that each tuple in the result must satisfy. This model is computationally efficient, as the database ...
Matteo Brucato, Juan Felipe Beltran, Azza Abouzied...
PVLDB
2016
81views Cryptology» more  PVLDB 2016»
10 years 22 days ago
Leveraging Lock Contention to Improve OLTP Application Performance
Locking is one of the predominant costs in transaction processing. While much work has focused on designing efficient concurrency control mechanisms, not much has been done on un...
Cong Yan, Alvin Cheung