Sciweavers

VLDB
2007
ACM
114views Database» more  VLDB 2007»
14 years 4 months ago
Optimization and evaluation of shortest path queries
We investigate the problem of how to evaluate efficiently a collection of shortest path queries on massive graphs that are too big to fit in the main memory. To evaluate a shortes...
Edward P. F. Chan, Heechul Lim
VLDB
2007
ACM
131views Database» more  VLDB 2007»
14 years 4 months ago
Dissemination of compressed historical information in sensor networks
Sensor nodes are small devices that "measure" their environment and communicate feeds of low-level data values to a base station for further processing and archiving. Dis...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
VLDB
2007
ACM
191views Database» more  VLDB 2007»
14 years 4 months ago
Multidimensional reverse k NN search
Given a multidimensional point q, a reverse k nearest neighbor (RkNN) query retrieves all the data points that have q as one of their k nearest neighbors. Existing methods for proc...
Yufei Tao, Dimitris Papadias, Xiang Lian, Xiaokui ...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 4 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
VLDB
2007
ACM
99views Database» more  VLDB 2007»
14 years 4 months ago
The dynamic predicate: integrating access control with query processing in XML databases
Jae-Gil Lee, Kyu-Young Whang, Wook-Shin Han, Il-Ye...
VLDB
2007
ACM
151views Database» more  VLDB 2007»
14 years 4 months ago
Consistent selectivity estimation via maximum entropy
Volker Markl, Peter J. Haas, Marcel Kutsch, Nimrod...
VLDB
2007
ACM
130views Database» more  VLDB 2007»
14 years 4 months ago
A framework for efficient regression tests on database applications
Regression testing is an important software maintenance activity to ensure the integrity of a software after modification. However, most methods and tools developed for software te...
Florian Haftmann, Donald Kossmann, Eric Lo
VLDB
2007
ACM
105views Database» more  VLDB 2007»
14 years 4 months ago
Using a distributed quadtree index in peer-to-peer networks
Abstract Peer-to-peer (P2P) networks have become a powerful means for online data exchange. Currently, users are primarily utilizing these networks to perform exact-match queries a...
Egemen Tanin, Aaron Harwood, Hanan Samet
VLDB
2007
ACM
101views Database» more  VLDB 2007»
14 years 4 months ago
eTuner: tuning schema matching software using synthetic scenarios
Yoonkyong Lee, Mayssam Sayyadian, AnHai Doan, Arno...
VLDB
2007
ACM
174views Database» more  VLDB 2007»
14 years 4 months ago
An adaptive and dynamic dimensionality reduction method for high-dimensional indexing
Abstract The notorious "dimensionality curse" is a wellknown phenomenon for any multi-dimensional indexes attempting to scale up to high dimensions. One well-known approa...
Heng Tao Shen, Xiaofang Zhou, Aoying Zhou