Sciweavers

DASFAA
2010
IEEE
213views Database» more  DASFAA 2010»
14 years 2 months ago
Efficient Algorithms to Monitor Continuous Constrained k Nearest Neighbor Queries
Abstract. Continuous monitoring of spatial queries has received significant research attention in the past few years. In this paper, we propose two efficient algorithms for the con...
Mahady Hasan, Muhammad Aamir Cheema, Wenyu Qu, Xue...
DASFAA
2010
IEEE
189views Database» more  DASFAA 2010»
14 years 2 months ago
Efficient Skyline Maintenance for Streaming Data with Partially-Ordered Domains
We address the problem of skyline query processing for a count-based window of continuous streaming data that involves both totally- and partially-ordered attribute domains. In thi...
Yuan Fang, Chee-Yong Chan
ICDT
2010
ACM
161views Database» more  ICDT 2010»
14 years 2 months ago
Data Correspondence, Exchange, and Repair
Checking the correspondence between two or more database instances and enforcing it is a procedure widely used in practice without however having been explored from a theoretical ...
Gösta Grahne, Adrian Onet
ICDT
2010
ACM
163views Database» more  ICDT 2010»
14 years 2 months ago
A Theoretical Study of 'Snapshot Isolation'
Snapshot Isolation is a popular and efficient protocol for concurrency control. In this paper we discuss Snapshot Isolation in view of the classical theory for transaction process...
Ragnar Normann, Lene T. Østby
ICDT
2010
ACM
147views Database» more  ICDT 2010»
14 years 2 months ago
Querying Parse Trees of Stochastic Context-Free Grammars
Stochastic context-free grammars (SCFGs) have long been recognized as useful for a large variety of tasks including natural language processing, morphological parsing, speech reco...
Sara Cohen, Benny Kimelfeld
ICDE
2010
IEEE
213views Database» more  ICDE 2010»
14 years 2 months ago
TargetSearch: A Ranking Friendly XML Keyword Search Engine
Abstract-- This demo illustrates an XML search engine TargetSearch that addresses an open problem in XML keyword search: given relevant matches to keywords, how to compose query re...
Ziyang Liu, Yichuan Cai, Yi Chen
ICDE
2010
IEEE
199views Database» more  ICDE 2010»
14 years 2 months ago
XMorph: A Shape-Polymorphic, Domain-Specific XML Data Transformation Language
By imposing a single hierarchy on data, XML makes queries brittle in the sense that a query might fail to produce the desired result if it is executed on the same data organized in...
Curtis Dyreson, Sourav S Bhowmick, Aswani Rao Jann...
DASFAA
2009
IEEE
253views Database» more  DASFAA 2009»
14 years 3 months ago
Implementing and Optimizing Fine-Granular Lock Management for XML Document Trees
Abstract. Fine-grained lock protocols with lock modes and lock granules adjusted to the various XML processing models, allow for highly concurrent transaction processing on XML tre...
Sebastian Bächle, Theo Härder, Michael P...
EDBT
2010
ACM
123views Database» more  EDBT 2010»
14 years 3 months ago
Lost source provenance
As the use of derived information has grown in recent years, the importance of provenance has been recognized, and there has been a great deal of effort devoted to developing tec...
Jing Zhang, H. V. Jagadish
DASFAA
2010
IEEE
165views Database» more  DASFAA 2010»
14 years 3 months ago
Towards an Algebraic Framework for Querying Inductive Databases
Abstract. In this paper, we present a theoretical foundation for querying inductive databases, which can accommodate disparate mining tasks. We present a data mining algebra includ...
Hong-Cheu Liu, Aditya Ghose, John Zeleznikow