Sciweavers

1830 search results - page 213 / 366
» Implementing a Tamper-Evident Database System
Sort
View
185
Voted
EDBT
2011
ACM
256views Database» more  EDBT 2011»
14 years 7 months ago
RanKloud: a scalable ranked query processing framework on hadoop
The popularity of batch-oriented cluster architectures like Hadoop is on the rise. These batch-based systems successfully achieve high degrees of scalability by carefully allocati...
K. Selçuk Candan, Parth Nagarkar, Mithila N...
169
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
HyperDex: a distributed, searchable key-value store
Distributed key-value stores are now a standard component of high-performance web services and cloud computing applications. While key-value stores offer significant performance...
Robert Escriva, Bernard Wong, Emin Gün Sirer
115
Voted
VLDB
1997
ACM
117views Database» more  VLDB 1997»
15 years 7 months ago
Optimizing Queries Across Diverse Data Sources
Businesses today need to interrelate data stored in diverse systems with differing capabilities, ideally via a single high-level query interface. We present the design of a query ...
Laura M. Haas, Donald Kossmann, Edward L. Wimmers,...
140
Voted
PDIS
1993
IEEE
15 years 7 months ago
Nested Loops Revisited
The research communityhas considered hash-based parallel joinalgorithmsthe algorithmsof choice for almosta decade. However, almostnone ofthe commercialparallel database systems us...
David J. DeWitt, Jeffrey F. Naughton, Joseph Burge...
214
Voted
ICDE
2006
IEEE
198views Database» more  ICDE 2006»
16 years 5 months ago
Automating the Design and Construction of Query Forms
One of the simplest ways to query a database is through a form, where a user can fill in relevant information and obtain desired results by submitting the form. Designing good sta...
Magesh Jayapandian, H. V. Jagadish