Sciweavers

DEBS
2011
ACM
12 years 8 months ago
DejaVu: a complex event processing system for pattern matching over live and historical data streams
This short paper provides an overview of the DejaVu complex event processing (CEP) system, with an emphasis on its novel architecture and query optimization techniques for correla...
Nihal Dindar, Peter M. Fischer, Nesime Tatbul
CIDR
2011
342views Algorithms» more  CIDR 2011»
12 years 8 months ago
Megastore: Providing Scalable, Highly Available Storage for Interactive Services
Megastore is a storage system developed to meet the requirements of today’s interactive online services. Megastore blends the scalability of a NoSQL datastore with the convenien...
Jason Baker, Chris Bond, James Corbett, J. J. Furm...
CIDR
2011
249views Algorithms» more  CIDR 2011»
12 years 8 months ago
The Case for Predictive Database Systems: Opportunities and Challenges
This paper argues that next generation database management systems should incorporate a predictive model management component to effectively support both inward-facing application...
Mert Akdere, Ugur Çetintemel, Matteo Rionda...
DASFAA
2011
IEEE
250views Database» more  DASFAA 2011»
12 years 8 months ago
An FTL-Agnostic Layer to Improve Random Write on Flash Memory
Flash memories are considered a competitive alternative to rotating disks as non-volatile data storage for database management systems. However, even if the Flash Translation Layer...
Brice Chardin, Olivier Pasteur, Jean-Marc Petit
GVD
2009
148views Database» more  GVD 2009»
13 years 2 months ago
Towards an Energy Aware DBMS - Energy Consumptions of Sorting and Join Algorithms
Database management systems comprise various algorithms for efficiently retrieving and managing data. Typically, algorithm efficiency or performance is correlated with execution s...
Hagen Höpfner, Christian Bunse
BNCOD
2009
125views Database» more  BNCOD 2009»
13 years 2 months ago
The Adaptation Model of a Runtime Adaptable DBMS
Nowadays maintenance of database management systems (DBMSs) often requires offline operations for enhancement of functionality or security updates. This hampers the availability of...
Florian Irmert, Thomas Fischer, Frank Lauterwald, ...
RAID
2010
Springer
13 years 3 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ALGORITHMICA
2008
95views more  ALGORITHMICA 2008»
13 years 4 months ago
Optimality in External Memory Hashing
Hash tables on external memory are commonly used for indexing in database management systems. In this paper we present an algorithm that, in an asymptotic sense, achieves the best...
Morten Skaarup Jensen, Rasmus Pagh
SIGCSE
2008
ACM
103views Education» more  SIGCSE 2008»
13 years 4 months ago
A query simulation system to illustrate database query execution
The underlying processes that enable database query execution are fundamental to understanding database management systems. However, these processes are complex and can be difficu...
Brett Allenstein, Andrew Yost, Paul Wagner, Joline...
FTDB
2007
95views more  FTDB 2007»
13 years 4 months ago
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industr...
Joseph M. Hellerstein, Michael Stonebraker, James ...