Sciweavers

1830 search results - page 212 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
2004
ACM
184views Database» more  SIGMOD 2004»
16 years 3 months ago
CORDS: Automatic Discovery of Correlations and Soft Functional Dependencies
The rich dependency structure found in the columns of real-world relational databases can be exploited to great advantage, but can also cause query optimizers--which usually assum...
Ihab F. Ilyas, Volker Markl, Peter J. Haas, Paul B...
198
Voted
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
16 years 3 months ago
Query suspend and resume
Suppose a long-running analytical query is executing on a database server and has been allocated a large amount of physical memory. A high-priority task comes in and we need to ru...
Badrish Chandramouli, Christopher N. Bond, Shivnat...
148
Voted
BMCBI
2007
187views more  BMCBI 2007»
15 years 3 months ago
BioWMS: a web-based Workflow Management System for bioinformatics
Background: An in-silico experiment can be naturally specified as a workflow of activities implementing, in a standardized environment, the process of data and control analysis. A...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...
140
Voted
SSDBM
2003
IEEE
164views Database» more  SSDBM 2003»
15 years 9 months ago
Approximate String Joins
String data is ubiquitous, and its management has taken on particular importance in the past few years. Approximate queries are very important on string data especially for more c...
Divesh Srivastava
151
Voted
ICPR
2002
IEEE
15 years 8 months ago
Virtual Audio System Customization Using Visual Matching of Ear Parameters
Applications in the creation of virtual auditory spaces (VAS) and sonification require individualized head related transfer functions (HRTFs) for perceptual fidelity. HRTFs exhi...
Dmitry N. Zotkin, Ramani Duraiswami, Larry S. Davi...