Sciweavers

1846 search results - page 211 / 370
» Fuzzy queries and relational databases
Sort
View
SSDBM
2008
IEEE
177views Database» more  SSDBM 2008»
14 years 5 months ago
Prioritized Evaluation of Continuous Moving Queries over Streaming Locations
Abstract. Existing approaches to the management of streaming positional updates generally assume that all active user requests have equal importance, ignoring the possibility of an...
Kostas Patroumpas, Timos K. Sellis
ICDT
2005
ACM
130views Database» more  ICDT 2005»
14 years 4 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash
VLDB
1998
ACM
105views Database» more  VLDB 1998»
14 years 3 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
VLDB
2004
ACM
124views Database» more  VLDB 2004»
14 years 4 months ago
Data Sharing Through Query Translation in Autonomous Sources
We consider the problem of data sharing between autonomous data sources in an environment where constraints cannot be placed on the shared contents of sources. Our solutions rely ...
Anastasios Kementsietsidis, Marcelo Arenas
ER
2008
Springer
110views Database» more  ER 2008»
14 years 17 days ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi