Sciweavers

SIGMOD
2009
ACM
172views Database» more  SIGMOD 2009»
15 years 11 months ago
Self-organizing tuple reconstruction in column-stores
Column-stores gained popularity as a promising physical design alternative. Each attribute of a relation is physically stored as a separate column allowing queries to load only th...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 11 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
PODS
2009
ACM
118views Database» more  PODS 2009»
15 years 11 months ago
Size and treewidth bounds for conjunctive queries
Georg Gottlob, Stephanie Tien Lee, Gregory Valiant
PODS
2009
ACM
92views Database» more  PODS 2009»
15 years 11 months ago
Similarity caching
Flavio Chierichetti, Ravi Kumar, Sergei Vassilvits...
ICDE
2009
IEEE
121views Database» more  ICDE 2009»
15 years 11 months ago
Scalability for Virtual Worlds
— Networked virtual environments (net-VEs) are the next wave of digital entertainment, with Massively Multiplayer Online Games (MMOs) a very popular instance. Current MMO archite...
Nitin Gupta 0003, Alan J. Demers, Johannes Gehrke,...
ICDE
2009
IEEE
126views Database» more  ICDE 2009»
15 years 11 months ago
Transaction Support for Log-Based Middleware Server Recovery
Abstract— We have developed log-based recovery for middleware servers that access back-end transaction systems (DBMSs). Transactional consistency is provided between in-memory st...
Rui Wang 0002, Betty Salzberg, David B. Lomet
105
Voted
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
15 years 11 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
ICDE
2009
IEEE
109views Database» more  ICDE 2009»
15 years 11 months ago
PLUS: A Message-Efficient Prototype for Location-Based Applications
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku, Hao...
ICDE
2009
IEEE
125views Database» more  ICDE 2009»
15 years 11 months ago
Automated Diagnosis of System Failures with Fa
Songyun Duan, Shivnath Babu
ICDE
2009
IEEE
118views Database» more  ICDE 2009»
15 years 11 months ago
An Incremental Threshold Method for Continuous Text Search Queries
Abstract—A text filtering system monitors a stream of incoming documents, to identify those that match the interest profiles of its users. The user interests are registered at ...
Kyriakos Mouratidis, HweeHwa Pang