Sciweavers

217 search results - page 43 / 44
» Query Execution Techniques for Caching Expensive Methods
Sort
View
AISS
2010
146views more  AISS 2010»
13 years 2 months ago
Zatara, the Plug-in-able Eventually Consistent Distributed Database
With the proliferation of the computer Cloud, new software delivery methods were created. In order to build software to fit into one of these models, a scalable, easy to deploy st...
Bogdan Carstoiu, Dorin Carstoiu
SIGIR
2012
ACM
11 years 9 months ago
Search, interrupted: understanding and predicting search task continuation
Many important search tasks require multiple search sessions to complete. Tasks such as travel planning, large purchases, or job searches can span hours, days, or even weeks. Inev...
Eugene Agichtein, Ryen W. White, Susan T. Dumais, ...
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
14 years 1 months ago
Text Cube: Computing IR Measures for Multidimensional Text Database Analysis
Since Jim Gray introduced the concept of ”data cube” in 1997, data cube, associated with online analytical processing (OLAP), has become a driving engine in data warehouse ind...
Cindy Xide Lin, Bolin Ding, Jiawei Han, Feida Zhu,...
VLDB
2000
ACM
120views Database» more  VLDB 2000»
13 years 11 months ago
Integrating the UB-Tree into a Database System Kernel
Multidimensional access methods have shown high potential for significant performance improvements in various application domains. However, only few approaches have made their way...
Frank Ramsak, Volker Markl, Robert Fenk, Martin Zi...
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
14 years 8 months ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni