Sciweavers

620 search results - page 39 / 124
» Algorithms for Rewriting Aggregate Queries Using Views
Sort
View
136
Voted
CCS
2006
ACM
15 years 7 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
162
Voted
PVLDB
2010
128views more  PVLDB 2010»
15 years 2 months ago
Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++
Supporting legacy applications when the database schema evolves represents a long-standing challenge of practical and theoretical importance. Recent work has produced algorithms a...
Carlo Curino, Hyun Jin Moon, Alin Deutsch, Carlo Z...
245
Voted
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
16 years 5 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
207
Voted
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
16 years 3 months ago
Exploiting self-monitoring sample views for cardinality estimation
Good cardinality estimates are critical for generating good execution plans during query optimization. Complex predicates, correlations between columns, and user-defined functions...
Jingren Zhou, Per-Åke Larson, Peter Zabback,...
149
Voted
CCS
2008
ACM
15 years 5 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig