Sciweavers

EDBT
2008
ACM
159views Database» more  EDBT 2008»
14 years 7 months ago
Automaton in or out: run-time plan optimization for XML stream processing
Many systems such as Tukwila and YFilter combine automaton and algebra techniques to process queries over tokenized XML streams. Typically in this architecture, an automaton is fi...
Hong Su, Elke A. Rundensteiner, Murali Mani
EDBT
2008
ACM
206views Database» more  EDBT 2008»
14 years 7 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo
EDBT
2008
ACM
135views Database» more  EDBT 2008»
14 years 7 months ago
Minimizing latency and memory in DSMS: a unified approach to quasi-optimal scheduling
Data Stream Management Systems (DSMSs) must support optimized execution scheduling of multiple continuous queries on massive, and frequently bursty, data streams. Previous approac...
Yijian Bai, Carlo Zaniolo
EDBT
2008
ACM
141views Database» more  EDBT 2008»
14 years 7 months ago
Generating Highly Customizable SQL Parsers
Database technology and the Structured Query Language (SQL) have grown enormously in recent years. Applications from different domains have different requirements for using databa...
Gunter Saake, Marko Rosenmüller, Martin Kuhle...
EDBT
2008
ACM
188views Database» more  EDBT 2008»
14 years 7 months ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...
EDBT
2008
ACM
122views Database» more  EDBT 2008»
14 years 7 months ago
Architectural Concerns for Flexible Data Management
Evolving database management systems (DBMS) towards more flexibility in functionality, adaptation to changing requirements, and extensions with new or different components, is a c...
Ionut Emanuel Subasu, Patrick Ziegler, Klaus R. Di...
EDBT
2008
ACM
130views Database» more  EDBT 2008»
14 years 7 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 7 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
EDBT
2008
ACM
131views Database» more  EDBT 2008»
14 years 7 months ago
A Bayesian approach for on-line max and min auditing
In this paper we consider the on-line max and min query auditing problem: given a private association between fields in a data set, a sequence of max and min queries that have alr...
Gerardo Canfora, Bice Cavallo