Sciweavers

ICDT
2007
ACM
185views Database» more  ICDT 2007»
13 years 11 months ago
Characterization of the Interaction of XML Functional Dependencies with DTDs
With the rise of XML as a standard model of data exchange, XML functional dependencies (XFDs) have become important to areas such as key analysis, document normalization, and data ...
Lucja Kot, Walker M. White
ICDT
2007
ACM
160views Database» more  ICDT 2007»
13 years 11 months ago
Beauty and the Beast: The Theory and Practice of Information Integration
Information integration is becoming a critical problem for businesses and individuals alike. Data volumes are sky-rocketing, and new sources and types of information are proliferat...
Laura M. Haas
ICDT
2007
ACM
143views Database» more  ICDT 2007»
13 years 11 months ago
Database Query Processing Using Finite Cursor Machines
We introduce a new abstract model of database query processing, finite cursor machines, that incorporates certain data streaming aspects. The model describes quite faithfully what...
Martin Grohe, Yuri Gurevich, Dirk Leinders, Nicole...
ICDT
2007
ACM
126views Database» more  ICDT 2007»
13 years 11 months ago
Containment of Conjunctive Queries over Databases with Null Values
Abstract. We study containment of conjunctive queries that are evaluated over databases that may contain tuples with null values. We assume the semantics of SQL for single block qu...
Carles Farré, Werner Nutt, Ernest Teniente,...
ICDT
2007
ACM
148views Database» more  ICDT 2007»
13 years 11 months ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork
ICDT
2007
ACM
87views Database» more  ICDT 2007»
13 years 11 months ago
Query Evaluation on a Database Given by a Random Graph
We consider random graphs, and their extensions to random structures, with edge probabilities of the form βn−α , where n is the number of vertices, α, β are fixed and α >...
Nilesh N. Dalvi
ICDT
2007
ACM
118views Database» more  ICDT 2007»
13 years 11 months ago
Consistent Query Answering: Five Easy Pieces
Abstract. Consistent query answering (CQA) is an approach to querying inconsistent databases without repairing them first. This invited talk introduces the basics of CQA, and disc...
Jan Chomicki
ICDT
2007
ACM
114views Database» more  ICDT 2007»
13 years 11 months ago
Axiomatizing the Logical Core of XPath 2.0
The first aim of this paper is to present the logical core of XPath 2.0: a logically clean, decidable fragment, which includes most navigational features of XPath 2.0 (complex co...
Balder ten Cate, Maarten Marx
ICDT
2007
ACM
90views Database» more  ICDT 2007»
13 years 11 months ago
On the Expressiveness of Implicit Provenance in Query and Update Languages
Abstract. Information concerning the origin of data (that is, its provenance) is important in many areas, especially scientific recordkeeping. Currently, provenance information mu...
Peter Buneman, James Cheney, Stijn Vansummeren