Sciweavers

8767 search results - page 1665 / 1754
» Enterprise Data Management
Sort
View
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
14 years 7 months ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...
ASPLOS
2012
ACM
14 years 5 days ago
DreamWeaver: architectural support for deep sleep
Numerous data center services exhibit low average utilization leading to poor energy efficiency. Although CPU voltage and frequency scaling historically has been an effective mea...
David Meisner, Thomas F. Wenisch
CORR
2012
Springer
227views Education» more  CORR 2012»
14 years 5 days ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
13 years 12 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
SIGMOD
2012
ACM
224views Database» more  SIGMOD 2012»
13 years 6 months ago
Tiresias: the database oracle for how-to queries
How-To queries answer fundamental data analysis questions of the form: “How should the input change in order to achieve the desired output”. As a Reverse Data Management probl...
Alexandra Meliou, Dan Suciu
« Prev « First page 1665 / 1754 Last » Next »