Sciweavers

DOLAP
2010
ACM
13 years 2 months ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero
DATESO
2010
369views Database» more  DATESO 2010»
13 years 3 months ago
Database Trends and Directions: Current Challenges and Opportunities
Database management has undergone more than four decades of evolution producing vast range of research and extensive array of technology solutions. The database research community ...
George Feuerlicht
CIKM
2010
Springer
13 years 3 months ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 3 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
SIGMOD
2008
ACM
100views Database» more  SIGMOD 2008»
13 years 5 months ago
Incorporating string transformations in record matching
Today's record matching infrastructure does not allow a flexible way to account for synonyms such as "Robert" and "Bob" which refer to the same name, and ...
Arvind Arasu, Surajit Chaudhuri, Kris Ganjam, Ragh...
P2PKM
2004
13 years 6 months ago
Coordinating Mobile Databases
Abstract. We are interested in the development of a database management layer which is completely portable and, therefore, "pluggable" on top of multiple host platforms. ...
Fausto Giunchiglia, Ilya Zaihrayeu
EDBT
2008
ACM
140views Database» more  EDBT 2008»
13 years 6 months ago
Database Servers Tailored to Improve Energy Efficiency
Database software can be tailored for specific application domains and their required functionality, for specific hardware and its characteristics, or for other purposes. This bri...
Goetz Graefe
EDBT
2008
ACM
136views Database» more  EDBT 2008»
13 years 6 months ago
A New Approach to Modular Database Systems
In this paper we present our approach towards a modularized database management system (DBMS) whose components can be adapted at runtime and show the modularization of a DBMS bene...
Florian Irmert, Michael Daum, Klaus Meyer-Wegener
CCS
2008
ACM
13 years 7 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ICDT
2010
ACM
194views Database» more  ICDT 2010»
13 years 7 months ago
Bag Equivalence of XPath Queries
When a query is evaluated under bag semantics, each answer is returned as many times as it has derivations. Bag semantics has long been recognized as important, especially when ag...
Sara Cohen, Yaacov Y. Weiss