Sciweavers

782 search results - page 81 / 157
» Query interactions in database workloads
Sort
View
152
Voted
TCC
2012
Springer
218views Cryptology» more  TCC 2012»
13 years 10 months ago
Iterative Constructions and Private Data Release
In this paper we study the problem of approximately releasing the cut function of a graph while preserving differential privacy, and give new algorithms (and new analyses of exis...
Anupam Gupta, Aaron Roth, Jonathan Ullman
225
Voted
SIGMOD
2007
ACM
157views Database» more  SIGMOD 2007»
16 years 2 months ago
Compiling mappings to bridge applications and databases
Translating data and data access operations between applications and databases is a longstanding data management problem. We present a novel approach to this problem, in which the...
Sergey Melnik, Atul Adya, Philip A. Bernstein
221
Voted
MMM
2005
Springer
185views Multimedia» more  MMM 2005»
15 years 8 months ago
Database Support for Haptic Exploration in Very Large Virtual Environments
The efficient management of complex objects has become an enabling technology for modern multimedia information systems as well as for many novel database applications. Unfortunat...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
16 years 4 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
113
Voted
VLDB
1998
ACM
144views Database» more  VLDB 1998»
15 years 6 months ago
Proximity Search in Databases
An information retrieval IR engine can rank documents based on textual proximityof keywords within each document. In this paper we apply this notion to search across an entire dat...
Roy Goldman, Narayanan Shivakumar, Suresh Venkatas...