Sciweavers

1830 search results - page 88 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
14 years 4 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
SIGMOD
2007
ACM
176views Database» more  SIGMOD 2007»
14 years 10 months ago
URank: formulation and efficient evaluation of top-k queries in uncertain databases
Top-k processing in uncertain databases is semantically and computationally different from traditional top-k processing. The interplay between query scores and data uncertainty ma...
Mohamed A. Soliman, Ihab F. Ilyas, Kevin Chen-Chua...
SIGMOD
2010
ACM
120views Database» more  SIGMOD 2010»
13 years 4 months ago
Paper bricks: an alternative to complete-story peer reviewing
The peer review system as used in several computer science communities has several flaws including long review times, overloaded reviewers, as well as fostering of niche topics. T...
Jens Dittrich
SSDBM
1998
IEEE
141views Database» more  SSDBM 1998»
14 years 2 months ago
Scientific Workflow Management by Database Management
In several working environments, production involves repeated executions of certain procedures. A workflow describes the individual tasks performed in these procedures and their i...
Anastassia Ailamaki, Yannis E. Ioannidis, Miron Li...
VLDB
1994
ACM
115views Database» more  VLDB 1994»
14 years 2 months ago
Database Graph Views: A Practical Model to Manage Persistent Graphs
Advanced technical applications like routing systems or electrical network managementsystems introduce the need for complex manipulations of large size graphs. Efficiently support...
Alejandro Gutiérrez, Philippe Pucheral, Her...