Sciweavers

IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
13 years 10 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
IDEAS
2005
IEEE
137views Database» more  IDEAS 2005»
13 years 10 months ago
Order-Sensitive XML Query Processing over Relational Sources: An Algebraic Approach
The XML data is order-sensitive. The order problem, that is how ordered XML documents and order-sensitive queries over it can be efficiently supported when mapped into the unorde...
Ling Wang, Song Wang, Brian Murphy, Elke A. Runden...
IDEAS
2005
IEEE
124views Database» more  IDEAS 2005»
13 years 10 months ago
Flexible Update Management in Peer-to-Peer Database Systems
Promising the combination of dynamic configuration, scalability and redundancy, peer-to-peer (P2P) networks have garnered tremendous interest lately. Before long, this interest ex...
David Del Vecchio, Sang Hyuk Son
IDEAS
2005
IEEE
149views Database» more  IDEAS 2005»
13 years 10 months ago
An Adaptive Multi-Objective Scheduling Selection Framework for Continuous Query Processing
Adaptive operator scheduling algorithms for continuous query processing are usually designed to serve a single performance objective, such as minimizing memory usage or maximizing...
Timothy M. Sutherland, Yali Zhu, Luping Ding, Elke...
IDEAS
2005
IEEE
65views Database» more  IDEAS 2005»
13 years 10 months ago
Fault-Tolerance in Distributed Query Processing
Jim Smith, Paul Watson
IDEAS
2005
IEEE
142views Database» more  IDEAS 2005»
13 years 10 months ago
Automatically Maintaining Wrappers for Web Sources
A substantial subset of the web data follows some kind of underlying structure. Nevertheless, HTML does not contain any schema or semantic information about the data it represents...
Juan Raposo, Alberto Pan, Manuel Álvarez, J...
IDEAS
2005
IEEE
99views Database» more  IDEAS 2005»
13 years 10 months ago
Distribution-Based Synthetic Database Generation Techniques for Itemset Mining
The resource requirements of frequent pattern mining algorithms depend mainly on the length distribution of the mined patterns in the database. Synthetic databases, which are used...
Ganesh Ramesh, Mohammed Javeed Zaki, William Mania...
IDEAS
2005
IEEE
106views Database» more  IDEAS 2005»
13 years 10 months ago
Using the Lock Manager to Choose Timestamps
Our goal is to support transaction-time functionality that enables the coexistence of ordinary, non-temporal tables with transaction-time tables. In such a system, each transactio...
David B. Lomet, Richard T. Snodgrass, Christian S....
IDEAS
2005
IEEE
103views Database» more  IDEAS 2005»
13 years 10 months ago
Persistent Middle Tier Components Without Logging
Enterprise applications need to be highly available and scalable. In the past, this has required “stateless” applications, which essentially require the application to manage ...
David B. Lomet
IDEAS
2005
IEEE
91views Database» more  IDEAS 2005»
13 years 10 months ago
Agents and Databases: Friends or Foes?
On first glance agent technology seems more like a hostile intruder into the database world. On the other hand, the two could easily complement each other, since agents carry out ...
Peter C. Lockemann, René Witte