Sciweavers

1004 search results - page 15 / 201
» Safe Constraint Queries
Sort
View
SIGMOD
2006
ACM
108views Database» more  SIGMOD 2006»
14 years 7 months ago
Query reformulation with constraints
Alin Deutsch, Lucian Popa, Val Tannen
PODS
2008
ACM
120views Database» more  PODS 2008»
14 years 7 months ago
Query evaluation with soft-key constraints
Abhay Jha, Vibhor Rastogi, Dan Suciu
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
13 years 9 months ago
Differential Privacy and the Fat-Shattering Dimension of Linear Queries
In this paper, we consider the task of answering linear queries under the constraint of differential privacy. This is a general and well-studied class of queries that captures oth...
Aaron Roth
JAPLL
2010
179views more  JAPLL 2010»
13 years 6 months ago
Tractable query answering and rewriting under description logic constraints
Answering queries over an incomplete database w.r.t. a set of constraints is an important computational task with applications in fields as diverse as information integration and ...
Héctor Pérez-Urbina, Boris Motik, Ia...