Sciweavers

280 search results - page 32 / 56
» pvldb 2008
Sort
View
PVLDB
2010
95views more  PVLDB 2010»
13 years 8 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
PVLDB
2010
92views more  PVLDB 2010»
13 years 8 months ago
SSD Bufferpool Extensions for Database Systems
High-end solid state disks (SSDs) provide much faster access to data compared to conventional hard disk drives. We present a technique for using solid-state storage as a caching l...
Mustafa Canim, George A. Mihaila, Bishwaranjan Bha...
PVLDB
2008
89views more  PVLDB 2008»
13 years 9 months ago
Constrained physical design tuning
Abstract Existing solutions to the automated physical design problem in database systems attempt to minimize execution costs of input workloads for a given storage constraint. In t...
Nicolas Bruno, Surajit Chaudhuri
PVLDB
2008
136views more  PVLDB 2008»
13 years 9 months ago
Keyword query cleaning
Unlike traditional database queries, keyword queries do not adhere to predefined syntax and are often dirty with irrelevant words from natural languages. This makes accurate and e...
Ken Q. Pu, Xiaohui Yu
PVLDB
2008
144views more  PVLDB 2008»
13 years 9 months ago
Mining search engine query logs via suggestion sampling
Many search engines and other web applications suggest auto-completions as the user types in a query. The suggestions are generated from hidden underlying databases, such as query...
Ziv Bar-Yossef, Maxim Gurevich