Sciweavers

41 search results - page 5 / 9
» How to Build a Trusted Database System on Untrusted Storage
Sort
View
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 1 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
CVPR
2008
IEEE
14 years 10 months ago
Lost in quantization: Improving particular object retrieval in large scale image databases
The state of the art in visual object retrieval from large databases is achieved by systems that are inspired by text retrieval. A key component of these approaches is that local ...
James Philbin, Ondrej Chum, Michael Isard, Josef S...
CIKM
2005
Springer
13 years 10 months ago
Fast on-line index construction by geometric partitioning
Inverted index structures are the mainstay of modern text retrieval systems. They can be constructed quickly using off-line mergebased methods, and provide efficient support for ...
Nicholas Lester, Alistair Moffat, Justin Zobel
VLDB
2005
ACM
185views Database» more  VLDB 2005»
14 years 8 months ago
Storing and querying XML data using denormalized relational databases
XML database systems emerge as a result of the acceptance of the XML data model. Recent works have followed the promising approach of building XML database management systems on un...
Andrey Balmin, Yannis Papakonstantinou
SIGMOD
2007
ACM
197views Database» more  SIGMOD 2007»
14 years 8 months ago
Automated and on-demand provisioning of virtual machines for database applications
Utility computing delivers compute and storage resources to applications as an `on-demand utility', much like electricity, from a distributed collection of computing resource...
Piyush Shivam, Azbayar Demberel, Pradeep Gunda, Da...