Sciweavers

EDBT
2008
ACM
111views Database» more  EDBT 2008»
15 years 17 days ago
Schema polynomials and applications
Conceptual complexity is emerging as a new bottleneck as data-base developers, application developers, and database administrators struggle to design and comprehend large, complex...
Kenneth A. Ross, Julia Stoyanovich
EDBT
2008
ACM
173views Database» more  EDBT 2008»
15 years 17 days ago
SeMap: a generic mapping construction system
Most previous schema mapping works focus on creating mappings in specific data models for data transformation, failing to capture a richer set of possible relationships between sc...
Ting Wang, Rachel Pottinger
EDBT
2008
ACM
166views Database» more  EDBT 2008»
15 years 17 days ago
Social ties and their relevance to churn in mobile telecom networks
Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individ...
Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan,...
EDBT
2008
ACM
118views Database» more  EDBT 2008»
15 years 17 days ago
Robustness in automatic physical database design
Automatic physical database design tools rely on "what-if" interfaces to the query optimizer to estimate the execution time of the training query workload under differen...
Kareem El Gebaly, Ashraf Aboulnaga
EDBT
2008
ACM
106views Database» more  EDBT 2008»
15 years 17 days ago
Highly scalable trip grouping for large-scale collective transportation systems
Transportation?related problems, like road congestion, parking, and pollution, are increasing in most cities. In order to reduce traffic, recent work has proposed methods for vehi...
Gyözö Gidófalvi, Torben Bach Pede...
EDBT
2008
ACM
202views Database» more  EDBT 2008»
15 years 17 days ago
BeMatch: a platform for matchmaking service behavior models
The capability to easily find useful services (software applications, software components, scientific computations) becomes increasingly critical in several fields. Current approa...
Juan Carlos Corrales, Daniela Grigori, Mokrane Bou...
EDBT
2008
ACM
147views Database» more  EDBT 2008»
15 years 17 days ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
EDBT
2008
ACM
95views Database» more  EDBT 2008»
15 years 17 days ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...
EDBT
2008
ACM
178views Database» more  EDBT 2008»
15 years 17 days ago
An inductive database and query language in the relational model
In the demonstration, we will present the concepts and an implementation of an inductive database ? as proposed by Imielinski and Mannila ? in the relational model. The goal is to...
Lothar Richter, Jörg Wicker, Kristina Kessler...
EDBT
2008
ACM
115views Database» more  EDBT 2008»
15 years 17 days ago
Data services in your spreadsheet!
Boualem Benatallah, Julien Vayssière, R&eac...