Sciweavers

1830 search results - page 149 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
2001
ACM
108views Database» more  SIGMOD 2001»
14 years 10 months ago
PREFER: A System for the Efficient Execution of Multi-parametric Ranked Queries
Users often need to optimize the selection of objects by appropriately weighting the importance of multiple object attributes. Such optimization problems appear often in operation...
Vagelis Hristidis, Nick Koudas, Yannis Papakonstan...
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 10 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
ICDE
2010
IEEE
224views Database» more  ICDE 2010»
14 years 10 months ago
Probabilistic Declarative Information Extraction
Abstract-Unstructured text represents a large fraction of the world's data. It often contain snippets of structured information within them (e.g., people's names and zip ...
Daisy Zhe Wang, Eirinaios Michelakis, Joseph M. He...
IDEAS
2003
IEEE
112views Database» more  IDEAS 2003»
14 years 3 months ago
Persistent Applications via Automatic Recovery
Building highly available enterprise applications using web-oriented middleware is hard. Runtime implementations frequently do not address the problems of application state persis...
Roger S. Barga, David B. Lomet, Stelios Paparizos,...
SIGMOD
2011
ACM
299views Database» more  SIGMOD 2011»
13 years 1 months ago
Processing theta-joins using MapReduce
Joins are essential for many data analysis tasks, but are not supported directly by the MapReduce paradigm. While there has been progress on equi-joins, implementation of join alg...
Alper Okcan, Mirek Riedewald