Sciweavers

SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
14 years 4 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
SIGMOD
2009
ACM
120views Database» more  SIGMOD 2009»
14 years 4 months ago
Kernel-based skyline cardinality estimation
The skyline of a d-dimensional dataset consists of all points not dominated by others. The incorporation of the skyline operator into practical database systems necessitates an ef...
Zhenjie Zhang, Yin Yang, Ruichu Cai, Dimitris Papa...
SIGMOD
2009
ACM
192views Database» more  SIGMOD 2009»
14 years 4 months ago
Scalable join processing on very large RDF graphs
With the proliferation of the RDF data format, engines for RDF query processing are faced with very large graphs that contain hundreds of millions of RDF triples. This paper addre...
Thomas Neumann, Gerhard Weikum
SIGMOD
2009
ACM
168views Database» more  SIGMOD 2009»
14 years 4 months ago
Database research in computer games
This tutorial presents an overview of the data management issues faced by computer games today. While many games do not use databases directly, they still have to process large am...
Alan J. Demers, Johannes Gehrke, Christoph Koch, B...
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
14 years 4 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
SIGMOD
2009
ACM
215views Database» more  SIGMOD 2009»
14 years 4 months ago
Efficient type-ahead search on relational data: a TASTIER approach
Existing keyword-search systems in relational databases require users to submit a complete query to compute answers. Often users feel "left in the dark" when they have l...
Guoliang Li, Shengyue Ji, Chen Li, Jianhua Feng
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 4 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
SIGMOD
2009
ACM
167views Database» more  SIGMOD 2009»
14 years 4 months ago
Exploring schema repositories with schemr
Schemr is a schema search engine, and provides users the ability to search for and visualize schemas stored in a metadata repository. Users may search by keywords and by example ?...
Kuang Chen, Jayant Madhavan, Alon Y. Halevy
SIGMOD
2009
ACM
235views Database» more  SIGMOD 2009»
14 years 4 months ago
Quality and efficiency in high dimensional nearest neighbor search
Nearest neighbor (NN) search in high dimensional space is an important problem in many applications. Ideally, a practical solution (i) should be implementable in a relational data...
Yufei Tao, Ke Yi, Cheng Sheng, Panos Kalnis
SIGMOD
2009
ACM
132views Database» more  SIGMOD 2009»
14 years 4 months ago
Generating example data for dataflow programs
Christopher Olston, Shubham Chopra, Utkarsh Srivas...