Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
We present an automatic skew mitigation approach for userdefined MapReduce programs and present SkewTune, a system that implements this approach as a drop-in replacement for an e...
YongChul Kwon, Magdalena Balazinska, Bill Howe, Je...
A system is presented to visualize information about city with a three-dimensional web user interface. We present a novel way to connect a VRML world to an information database. A...
Topological relationships like overlap, inside, meet, and disjoint uniquely characterize the relative position between objects in space. For a long time, they have been a focus of...