Sciweavers

ICDE
2007
IEEE
130views Database» more  ICDE 2007»
15 years 6 days ago
Dynamic Materialized Views
A conventional materialized view blindly materializes and maintains all rows of a view, even rows that are never accessed. We propose a more flexible materialization strategy aime...
Jingren Zhou, Jonathan Goldstein, Luping Ding, Per...
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
15 years 6 days ago
A Load Shedding Framework and Optimizations for M-way Windowed Stream Joins
Tuple dropping, though commonly used for load shedding in most stream operations, is inadequate for m-way, windowed stream joins. The join output rate can be overly reduced becaus...
Bugra Gedik, Kun-Lung Wu, Philip S. Yu, Ling Liu
ICDE
2007
IEEE
157views Database» more  ICDE 2007»
15 years 6 days ago
Object Distinction: Distinguishing Objects with Identical Names
Different people or objects may share identical names in the real world, which causes confusion in many applications. It is a nontrivial task to distinguish those objects, especia...
Xiaoxin Yin, Jiawei Han, Philip S. Yu
ICDE
2007
IEEE
126views Database» more  ICDE 2007»
15 years 6 days ago
QPIAD: Query Processing over Incomplete Autonomous Databases
Incompleteness due to missing attribute values (aka "null values") is very common in autonomous web databases, on which user accesses are usually supported through media...
Hemal Khatri, Jianchun Fan, Yi Chen, Subbarao Kamb...
ICDE
2007
IEEE
92views Database» more  ICDE 2007»
15 years 6 days ago
STAR: A System for Tuple and Attribute Ranking of Query Answers
In recent years there has been a great deal of interest in developing effective techniques for ad-hoc search and retrieval in structured repositories such as relational databases ...
Nishant Kapoor, Gautam Das, Vagelis Hristidis, S. ...
ICDE
2007
IEEE
117views Database» more  ICDE 2007»
15 years 6 days ago
Unnesting Scalar SQL Queries in the Presence of Disjunction
Optimizing nested queries is an intricate problem. It becomes even harder if in a nested query the linking predicate or the correlation predicate occurs disjunctively. We present ...
Matthias Brantner, Norman May, Guido Moerkotte
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 6 days ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...
ICDE
2007
IEEE
118views Database» more  ICDE 2007»
15 years 6 days ago
Summarizing Order Statistics over Data Streams with Duplicates
Ying Zhang, Xuemin Lin, Yidong Yuan, Masaru Kitsur...
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
15 years 6 days ago
The Haar+ Tree: A Refined Synopsis Data Structure
We introduce the Haar+ tree: a refined, wavelet-inspired data structure for synopsis construction. The advantages of this structure are twofold: First, it achieves higher synopsis...
Panagiotis Karras, Nikos Mamoulis
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
15 years 6 days ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal