Sciweavers

VLDB
2007
ACM
114views Database» more  VLDB 2007»
15 years 20 days ago
Optimization and evaluation of shortest path queries
We investigate the problem of how to evaluate efficiently a collection of shortest path queries on massive graphs that are too big to fit in the main memory. To evaluate a shortes...
Edward P. F. Chan, Heechul Lim
VLDB
2007
ACM
131views Database» more  VLDB 2007»
15 years 20 days ago
Dissemination of compressed historical information in sensor networks
Sensor nodes are small devices that "measure" their environment and communicate feeds of low-level data values to a base station for further processing and archiving. Dis...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
VLDB
2007
ACM
191views Database» more  VLDB 2007»
15 years 20 days ago
Multidimensional reverse k NN search
Given a multidimensional point q, a reverse k nearest neighbor (RkNN) query retrieves all the data points that have q as one of their k nearest neighbors. Existing methods for proc...
Yufei Tao, Dimitris Papadias, Xiang Lian, Xiaokui ...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 20 days ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
VLDB
2007
ACM
99views Database» more  VLDB 2007»
15 years 20 days ago
The dynamic predicate: integrating access control with query processing in XML databases
Jae-Gil Lee, Kyu-Young Whang, Wook-Shin Han, Il-Ye...
VLDB
2007
ACM
151views Database» more  VLDB 2007»
15 years 20 days ago
Consistent selectivity estimation via maximum entropy
Volker Markl, Peter J. Haas, Marcel Kutsch, Nimrod...
VLDB
2007
ACM
130views Database» more  VLDB 2007»
15 years 20 days ago
A framework for efficient regression tests on database applications
Regression testing is an important software maintenance activity to ensure the integrity of a software after modification. However, most methods and tools developed for software te...
Florian Haftmann, Donald Kossmann, Eric Lo
VLDB
2007
ACM
105views Database» more  VLDB 2007»
15 years 20 days ago
Using a distributed quadtree index in peer-to-peer networks
Abstract Peer-to-peer (P2P) networks have become a powerful means for online data exchange. Currently, users are primarily utilizing these networks to perform exact-match queries a...
Egemen Tanin, Aaron Harwood, Hanan Samet
VLDB
2007
ACM
101views Database» more  VLDB 2007»
15 years 20 days ago
eTuner: tuning schema matching software using synthetic scenarios
Yoonkyong Lee, Mayssam Sayyadian, AnHai Doan, Arno...
VLDB
2007
ACM
174views Database» more  VLDB 2007»
15 years 20 days ago
An adaptive and dynamic dimensionality reduction method for high-dimensional indexing
Abstract The notorious "dimensionality curse" is a wellknown phenomenon for any multi-dimensional indexes attempting to scale up to high dimensions. One well-known approa...
Heng Tao Shen, Xiaofang Zhou, Aoying Zhou