Sciweavers

3146 search results - page 438 / 630
» Efficient Consequence Finding
Sort
View
97
Voted
PODS
2005
ACM
115views Database» more  PODS 2005»
16 years 3 months ago
A divide-and-merge methodology for clustering
We present a divide-and-merge methodology for clustering a set of objects that combines a top-down "divide" phase with a bottom-up "merge" phase. In contrast, ...
David Cheng, Santosh Vempala, Ravi Kannan, Grant W...
128
Voted
PODS
2008
ACM
123views Database» more  PODS 2008»
16 years 3 months ago
Evaluating rank joins with optimal cost
In the rank join problem, we are given a set of relations and a scoring function, and the goal is to return the join results with the top K scores. It is often the case in practic...
Karl Schnaitter, Neoklis Polyzotis
147
Voted
EDBT
2004
ACM
155views Database» more  EDBT 2004»
16 years 3 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher
128
Voted
ICFP
2002
ACM
16 years 3 months ago
Monads for incremental computing
This paper presents a monadic approach to incremental computation, suitable for purely functional languages such as Haskell. A program that uses incremental computation is able to...
Magnus Carlsson
128
Voted
ICDE
2010
IEEE
359views Database» more  ICDE 2010»
16 years 3 months ago
Policy-Aware Sender Anonymity in Location Based Services
Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...