Sciweavers

28888 search results - page 5551 / 5778
» Computability and complexity in analysis
Sort
View
222
Voted
VLDB
2007
ACM
155views Database» more  VLDB 2007»
16 years 3 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
231
Voted
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
16 years 3 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden
223
Voted
SIGMOD
2007
ACM
219views Database» more  SIGMOD 2007»
16 years 3 months ago
Efficient exploitation of similar subexpressions for query processing
Complex queries often contain common or similar subexpressions, either within a single query or among multiple queries submitted as a batch. If so, query execution time can be imp...
Jingren Zhou, Johann Christoph Freytag, Per-Å...
124
Voted
SIGMOD
2002
ACM
108views Database» more  SIGMOD 2002»
16 years 3 months ago
An adaptive peer-to-peer network for distributed caching of OLAP results
Peer-to-Peer (P2P) systems are becoming increasingly popular as they enable users to exchange digital information by participating in complex networks. Such systems are inexpensiv...
Panos Kalnis, Wee Siong Ng, Beng Chin Ooi, Dimitri...
PODS
2004
ACM
158views Database» more  PODS 2004»
16 years 3 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
« Prev « First page 5551 / 5778 Last » Next »