Sciweavers

SIGMOD
2008
ACM
65views Database» more  SIGMOD 2008»
14 years 11 months ago
Generating targeted queries for database testing
Tools for generating test queries for databases do not explicitly take into account the actual data in the database. As a consequence, such tools cannot guarantee suitable coverag...
Chaitanya Mishra, Nick Koudas, Calisto Zuzarte
SIGMOD
2008
ACM
161views Database» more  SIGMOD 2008»
14 years 11 months ago
Efficient pattern matching over event streams
Pattern matching over event streams is increasingly being employed in many areas including financial services, RFIDbased inventory management, click stream analysis, and electroni...
Jagrati Agrawal, Yanlei Diao, Daniel Gyllstrom, Ne...
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 11 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
SIGMOD
2008
ACM
102views Database» more  SIGMOD 2008»
14 years 11 months ago
Stream firewalling of xml constraints
As XML-based messages have become common in many client-server protocols, there is a need to protect application servers from invalid or dangerous messages. This leads to the XML ...
Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild
SIGMOD
2008
ACM
120views Database» more  SIGMOD 2008»
14 years 11 months ago
Muse: a system for understanding and designing mappings
Schema mappings are logical assertions that specify the relationships between a source and a target schema in a declarative way. The specification of such mappings is a fundamenta...
Bogdan Alexe, Laura Chiticariu, Renée J. Mi...
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
14 years 11 months ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
14 years 11 months ago
Mining significant graph patterns by leap search
With ever-increasing amounts of graph data from disparate sources, there has been a strong need for exploiting significant graph patterns with user-specified objective functions. ...
Xifeng Yan, Hong Cheng, Jiawei Han, Philip S. Yu
SIGMOD
2008
ACM
179views Database» more  SIGMOD 2008»
14 years 11 months ago
BibNetMiner: mining bibliographic information networks
Online bibliographic databases, such as DBLP in computer science and PubMed in medical sciences, contain abundant information about research publications in different fields. Each...
Yizhou Sun, Tianyi Wu, Zhijun Yin, Hong Cheng, Jia...
SIGMOD
2008
ACM
182views Database» more  SIGMOD 2008»
14 years 11 months ago
Multi-tenant databases for software as a service: schema-mapping techniques
In the implementation of hosted business services, multiple tenants are often consolidated into the same database to reduce total cost of ownership. Common practice is to map mult...
Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons...
SIGMOD
2008
ACM
90views Database» more  SIGMOD 2008»
14 years 11 months ago
Toward best-effort information extraction
Current approaches to develop information extraction (IE) programs have largely focused on producing precise IE results. As such, they suffer from three major limitations. First, ...
Warren Shen, Pedro DeRose, Robert McCann, AnHai Do...