Sciweavers

25041 search results - page 4735 / 5009
» Algorithms for Clustering Data
Sort
View
165
Voted
SIGMOD
2003
ACM
136views Database» more  SIGMOD 2003»
16 years 5 months ago
A Characterization of the Sensitivity of Query Optimization to Storage Access Cost Parameters
Most relational query optimizers make use of information about the costs of accessing tuples and data structures on various storage devices. This information can at times be off b...
Frederick Reiss, Tapas Kanungo
147
Voted
EDBT
2006
ACM
174views Database» more  EDBT 2006»
16 years 5 months ago
Fast Computation of Reachability Labeling for Large Graphs
The need of processing graph reachability queries stems from many applications that manage complex data as graphs. The applications include transportation network, Internet traffic...
Jiefeng Cheng, Jeffrey Xu Yu, Xuemin Lin, Haixun W...
139
Voted
EDBT
2006
ACM
177views Database» more  EDBT 2006»
16 years 5 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
148
Voted
EDBT
2006
ACM
105views Database» more  EDBT 2006»
16 years 5 months ago
HASE: A Hybrid Approach to Selectivity Estimation for Conjunctive Predicates
Current methods for selectivity estimation fall into two broad categories, synopsis-based and sampling-based. Synopsis-based methods, such as histograms, incur minimal overhead at ...
Xiaohui Yu, Nick Koudas, Calisto Zuzarte
ICDE
2010
IEEE
801views Database» more  ICDE 2010»
16 years 4 months ago
The Similarity Join Database Operator
Similarity joins have been studied as key operations in multiple application domains, e.g., record linkage, data cleaning, multimedia and video applications, and phenomena detectio...
Mohamed H. Ali, Walid G. Aref, Yasin N. Silva
« Prev « First page 4735 / 5009 Last » Next »