Sciweavers

IDEAS
2005
IEEE
99views Database» more  IDEAS 2005»
14 years 1 months ago
Distribution-Based Synthetic Database Generation Techniques for Itemset Mining
The resource requirements of frequent pattern mining algorithms depend mainly on the length distribution of the mined patterns in the database. Synthetic databases, which are used...
Ganesh Ramesh, Mohammed Javeed Zaki, William Mania...
IDEAS
2005
IEEE
106views Database» more  IDEAS 2005»
14 years 1 months ago
Using the Lock Manager to Choose Timestamps
Our goal is to support transaction-time functionality that enables the coexistence of ordinary, non-temporal tables with transaction-time tables. In such a system, each transactio...
David B. Lomet, Richard T. Snodgrass, Christian S....
IDEAS
2005
IEEE
103views Database» more  IDEAS 2005»
14 years 1 months ago
Persistent Middle Tier Components Without Logging
Enterprise applications need to be highly available and scalable. In the past, this has required “stateless” applications, which essentially require the application to manage ...
David B. Lomet
IDEAS
2005
IEEE
91views Database» more  IDEAS 2005»
14 years 1 months ago
Agents and Databases: Friends or Foes?
On first glance agent technology seems more like a hostile intruder into the database world. On the other hand, the two could easily complement each other, since agents carry out ...
Peter C. Lockemann, René Witte
IDEAS
2005
IEEE
109views Database» more  IDEAS 2005»
14 years 1 months ago
Efficient Relational Joins with Arithmetic Constraints on Multiple Attributes
We introduce and study a new class of queries that we refer to as ACMA (arithmetic constraints on multiple attributes) queries. Such combinatorial queries require the simultaneous...
Chuang Liu, Lingyun Yang, Ian T. Foster
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 1 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
IDEAS
2005
IEEE
93views Database» more  IDEAS 2005»
14 years 1 months ago
Semantic Query Transformation Using Ontologies
Traditional approaches to query processing aim at rewriting a given query into another more efficient one that uses less time and/or resources during the execution. There by, the...
Chokri Ben Necib, Johann Christoph Freytag
IDEAS
2005
IEEE
80views Database» more  IDEAS 2005»
14 years 1 months ago
Dynamic Histograms for Non-Stationary Updates
In this paper, we address the problem of incrementally maintaining a histogram in response to a non-stationary update process. In relational database systems, this problem can occ...
Elizabeth Lam, Kenneth Salem
IDEAS
2005
IEEE
121views Database» more  IDEAS 2005»
14 years 1 months ago
A Hierarchy Navigation Framework: Supporting Scalable Interactive Exploration over Large Databases
Nishant Mehta, Elke A. Rundensteiner, Matthew O. W...
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 1 months ago
On the Intersection of XPath Expressions
— XPath is a common language for selecting nodes in an XML document. XPath uses so called path expressions which describe a navigation path through semistructured data. In the la...
Beda Christoph Hammerschmidt, Martin Kempa, Volker...