Sciweavers

EDBT
2008
ACM
236views Database» more  EDBT 2008»
14 years 7 months ago
Virtualization and databases: state of the art and research challenges
ng the abstract view of computing resources from the implementation of these resources of indirection between abstract view and implementation of resources - Hides implementation d...
Ashraf Aboulnaga, Cristiana Amza, Kenneth Salem
EDBT
2008
ACM
150views Database» more  EDBT 2008»
14 years 7 months ago
Cost-based query optimization for complex pattern mining on multiple databases
For complex data mining queries, query optimization issues arise, similar to those for the traditional database queries. However, few works have applied the cost-based query optim...
Ruoming Jin, David Fuhry, Abdulkareem Alali
EDBT
2008
ACM
108views Database» more  EDBT 2008»
14 years 7 months ago
Revisiting redundancy and minimization in an XPath fragment
Redundancy and minimization of queries are investigated in a well known fragment of XPath that includes child and descendant edges, branches, wildcards, and multiple output nodes....
Benny Kimelfeld, Yehoshua Sagiv
EDBT
2008
ACM
180views Database» more  EDBT 2008»
14 years 7 months ago
Probabilistic ranked queries in uncertain databases
Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to "certain" data, ...
Xiang Lian, Lei Chen 0002
EDBT
2008
ACM
103views Database» more  EDBT 2008»
14 years 7 months ago
A stratified approach to progressive approximate joins
Users often do not require a complete answer to their query but rather only a sample. They expect the sample to be either the largest possible or the most representative (or both)...
Wee Hyong Tok, Stéphane Bressan, Mong-Li Le...
EDBT
2008
ACM
113views Database» more  EDBT 2008»
14 years 7 months ago
Ensuring correctness over untrusted private database
In this paper we address the problem of ensuring the correctness of query results returned by an untrusted private database. The database owns the data and may modify it at any ti...
Sarvjeet Singh, Sunil Prabhakar
EDBT
2008
ACM
130views Database» more  EDBT 2008»
14 years 7 months ago
Self-organizing strategies for a column-store database
Column-store database systems open new vistas for improved maintenance through self-organization. Individual columns are the focal point, which simplify balancing conflicting requ...
Milena Ivanova, Martin L. Kersten, Niels Nes
EDBT
2008
ACM
162views Database» more  EDBT 2008»
14 years 7 months ago
Schema merging and mapping creation for relational sources
We address the problem of generating a mediated schema from a set of relational data source schemas and conjunctive queries that specify where those schemas overlap. Unlike past a...
Rachel Pottinger, Philip A. Bernstein
EDBT
2008
ACM
166views Database» more  EDBT 2008»
14 years 7 months ago
A novel spectral coding in a large graph database
Retrieving related graphs containing a query graph from a large graph database is a key issue in many graph-based applications, such as drug discovery and structural pattern recog...
Lei Zou, Lei Chen 0002, Jeffrey Xu Yu, Yansheng Lu
EDBT
2008
ACM
120views Database» more  EDBT 2008»
14 years 7 months ago
Flint: Google-basing the Web
Several Web sites deliver a large number of pages, each publishing data about one instance of some real world entity, such as an athlete, a stock quote, a book. Even though it is ...
Lorenzo Blanco, Valter Crescenzi, Paolo Merialdo, ...