Sciweavers

1235 search results - page 233 / 247
» Updating a cracked database
Sort
View
ICDE
2009
IEEE
174views Database» more  ICDE 2009»
14 years 2 months ago
Sketching Sampled Data Streams
—Sampling is used as a universal method to reduce the running time of computations – the computation is performed on a much smaller sample and then the result is scaled to comp...
Florin Rusu, Alin Dobra
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 2 months ago
Support Multi-version Applications in SaaS via Progressive Schema Evolution
— Update of applications in SaaS is expected to be a continuous efforts and cannot be done overnight or over the weekend. In such migration efforts, users are trained and shifted...
Jianfeng Yan, Bo Zhang
GIS
2009
ACM
14 years 2 months ago
Constrained reverse nearest neighbor search on mobile objects
In this paper, we formalize the novel concept of Constrained Reverse k-Nearest Neighbor (CRkNN) search on mobile objects (clients) performed at a central server. The CRkNN query c...
Tobias Emrich, Hans-Peter Kriegel, Peer Kröge...
CCS
2007
ACM
14 years 1 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
ICDE
2006
IEEE
147views Database» more  ICDE 2006»
14 years 1 months ago
Distributing Google
We consider the problem of wide-area large-scale text search over a peer-to-peer infrastructure. A wide-area search infrastructure with billions of documents and millions of searc...
Vijay Gopalakrishnan, Bobby Bhattacharjee, Peter J...