Sciweavers

18697 search results - page 3654 / 3740
» Systemic Security Management
Sort
View
SIGMOD
2007
ACM
186views Database» more  SIGMOD 2007»
16 years 4 months ago
Fg-index: towards verification-free query processing on graph databases
Graphs are prevalently used to model the relationships between objects in various domains. With the increasing usage of graph databases, it has become more and more demanding to e...
James Cheng, Yiping Ke, Wilfred Ng, An Lu
231
Voted
SIGMOD
2007
ACM
219views Database» more  SIGMOD 2007»
16 years 4 months ago
Efficient exploitation of similar subexpressions for query processing
Complex queries often contain common or similar subexpressions, either within a single query or among multiple queries submitted as a batch. If so, query execution time can be imp...
Jingren Zhou, Johann Christoph Freytag, Per-Å...
SIGMOD
2007
ACM
146views Database» more  SIGMOD 2007»
16 years 4 months ago
Distributed query evaluation with performance guarantees
Partial evaluation has recently proven an effective technique for evaluating Boolean XPath queries over a fragmented tree that is distributed over a number of sites. What left ope...
Gao Cong, Wenfei Fan, Anastasios Kementsietsidis
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
16 years 4 months ago
Query suspend and resume
Suppose a long-running analytical query is executing on a database server and has been allocated a large amount of physical memory. A high-priority task comes in and we need to ru...
Badrish Chandramouli, Christopher N. Bond, Shivnat...
SIGMOD
2007
ACM
165views Database» more  SIGMOD 2007»
16 years 4 months ago
Statistical analysis of sketch estimators
Sketching techniques can provide approximate answers to aggregate queries either for data-streaming or distributed computation. Small space summaries that have linearity propertie...
Florin Rusu, Alin Dobra
« Prev « First page 3654 / 3740 Last » Next »