Sciweavers

PVLDB
2016
85views Cryptology» more  PVLDB 2016»
7 years 11 months ago
Maximizing Bichromatic Reverse Spatial and Textual k Nearest Neighbor Queries
The problem of maximizing bichromatic reverse k nearest neighbor queries (BRkNN) has been extensively studied in spatial databases. In this work, we present a related query for sp...
Farhana Murtaza Choudhury, J. Shane Culpepper, Tim...
PVLDB
2016
91views Cryptology» more  PVLDB 2016»
7 years 11 months ago
LEOPARD: Lightweight Edge-Oriented Partitioning and Replication for Dynamic Graphs
This paper introduces a dynamic graph partitioning algorithm, designed for large, constantly changing graphs. We propose a partitioning framework that adjusts on the fly as the g...
Jiewen Huang, Daniel Abadi
PVLDB
2016
63views Cryptology» more  PVLDB 2016»
7 years 11 months ago
Repairing Data through Regular Expressions
Since regular expressions are often used to detect errors in sequences such as strings or date, it is natural to use them for data repair. Motivated by this, we propose a data rep...
Zeyu Li, Hongzhi Wang, Wei Shao, Jianzhong Li, Hon...
PVLDB
2016
72views Cryptology» more  PVLDB 2016»
7 years 11 months ago
A Shifting Bloom Filter Framework for Set Queries
Set queries are fundamental operations in computer systems and applications. This paper addresses the fundamental problem of designing a probabilistic data structure that can quic...
Tong Yang, Alex X. Liu, Muhammad Shahzad, Yuankun ...
PVLDB
2016
80views Cryptology» more  PVLDB 2016»
7 years 11 months ago
Inferray: fast in-memory RDF inference
The advent of semantic data on the Web requires efficient reasoning systems to infer RDF and OWL data. The linked nature and the huge volume of data entail efficiency and scalabil...
Julien Subercaze, Christophe Gravier, Jules Cheval...
PVLDB
2016
77views Cryptology» more  PVLDB 2016»
7 years 11 months ago
SlimShot: In-Database Probabilistic Inference for Knowledge Bases
Increasingly large Knowledge Bases are being created, by crawling the Web or other corpora of documents, and by extracting facts and relations using machine learning techniques. T...
Eric Gribkoff, Dan Suciu
PVLDB
2016
121views Cryptology» more  PVLDB 2016»
7 years 11 months ago
BCC: Reducing False Aborts in Optimistic Concurrency Control with Low Cost for In-Memory Databases
The Optimistic Concurrency Control (OCC) method has been commonly used for in-memory databases to ensure transaction serializability — a transaction will be aborted if its read ...
Yuan Yuan, Kaibo Wang, Rubao Lee, Xiaoning Ding, J...
PVLDB
2016
74views Cryptology» more  PVLDB 2016»
7 years 11 months ago
Exploiting Equality Generating Dependencies in Checking Chase Termination
The chase is a well-known algorithm with a wide range of applications in data exchange, data cleaning, data integration, query optimization, and ontological reasoning. Since the c...
Marco Calautti, Sergio Greco, Cristian Molinaro, I...
PVLDB
2016
108views Cryptology» more  PVLDB 2016»
7 years 11 months ago
A General-Purpose Query-Centric Framework for Querying Big Graphs
Pioneered by Google’s Pregel, many distributed systems have been developed for large-scale graph analytics. These systems employ a user-friendly “think like a vertex” progra...
Da Yan, James Cheng, M. Tamer Özsu, Fan Yang,...
PVLDB
2016
79views Cryptology» more  PVLDB 2016»
7 years 11 months ago
Scalable Package Queries in Relational Database Systems
Traditional database queries follow a simple model: they define constraints that each tuple in the result must satisfy. This model is computationally efficient, as the database ...
Matteo Brucato, Juan Felipe Beltran, Azza Abouzied...