Sciweavers

PVLDB
2016
121views Cryptology» more  PVLDB 2016»
8 years 7 months ago
BCC: Reducing False Aborts in Optimistic Concurrency Control with Low Cost for In-Memory Databases
The Optimistic Concurrency Control (OCC) method has been commonly used for in-memory databases to ensure transaction serializability — a transaction will be aborted if its read ...
Yuan Yuan, Kaibo Wang, Rubao Lee, Xiaoning Ding, J...
PVLDB
2016
74views Cryptology» more  PVLDB 2016»
8 years 7 months ago
Exploiting Equality Generating Dependencies in Checking Chase Termination
The chase is a well-known algorithm with a wide range of applications in data exchange, data cleaning, data integration, query optimization, and ontological reasoning. Since the c...
Marco Calautti, Sergio Greco, Cristian Molinaro, I...
PVLDB
2016
108views Cryptology» more  PVLDB 2016»
8 years 7 months ago
A General-Purpose Query-Centric Framework for Querying Big Graphs
Pioneered by Google’s Pregel, many distributed systems have been developed for large-scale graph analytics. These systems employ a user-friendly “think like a vertex” progra...
Da Yan, James Cheng, M. Tamer Özsu, Fan Yang,...
PVLDB
2016
79views Cryptology» more  PVLDB 2016»
8 years 7 months ago
Scalable Package Queries in Relational Database Systems
Traditional database queries follow a simple model: they define constraints that each tuple in the result must satisfy. This model is computationally efficient, as the database ...
Matteo Brucato, Juan Felipe Beltran, Azza Abouzied...
PVLDB
2016
81views Cryptology» more  PVLDB 2016»
8 years 7 months ago
Leveraging Lock Contention to Improve OLTP Application Performance
Locking is one of the predominant costs in transaction processing. While much work has focused on designing efficient concurrency control mechanisms, not much has been done on un...
Cong Yan, Alvin Cheung
PRL
2016
70views Cryptology» more  PRL 2016»
8 years 7 months ago
Minimalistic CNN-based ensemble model for gender prediction from face images
Despite being extensively studied in the literature, the problem of gender recognition from face images remains difficult when dealing with unconstrained images in a cross-dataset...
Grigory Antipov, Sid-Ahmed Berrani, Jean-Luc Dugel...
PRL
2016
62views Cryptology» more  PRL 2016»
8 years 7 months ago
Assisted keyword indexing for lecture videos using unsupervised keyword spotting
Many students use videos to supplement learning outside the classroom. This is particularly important for students with challenged visual capacities, for whom seeing the board dur...
Manish Kanadje, Zachary Miller, Anurag Agarwal, Ro...
PR
2016
70views Cryptology» more  PR 2016»
8 years 7 months ago
A new method for multi-oriented graphics-scene-3D text classification in video
Text detection and recognition in video is challenging due to the presence of different types of texts, namely, graphics (video caption), scene (natural text), 2D, 3D, static and ...
Jiamin Xu, Palaiahnakote Shivakumara, Tong Lu, Che...
PR
2016
64views Cryptology» more  PR 2016»
8 years 7 months ago
Active cleaning of label noise
Mislabeled examples in the training data can severely affect the performance of supervised classifiers. In this paper, we present an approach to remove any mislabeled examples i...
Ekambaram Rajmadhan, Sergiy Fefilatyev, Matthew Sh...
PR
2016
56views Cryptology» more  PR 2016»
8 years 7 months ago
Measuring linearity of curves in 2D and 3D
Paul L. Rosin, Jovanka Pantovic, Jovisa D. Zunic