Sciweavers

123 search results - page 3 / 25
» Characterizing Database User's Access Patterns
Sort
View
IMC
2009
ACM
14 years 26 days ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
SIGMOD
2010
ACM
183views Database» more  SIGMOD 2010»
13 years 1 months ago
TPC-E vs. TPC-C: characterizing the new TPC-E benchmark via an I/O comparison study
TPC-E is a new OLTP benchmark recently approved by the Transaction Processing Performance Council (TPC). In this paper, we compare TPC-E with the familiar TPCC benchmark in order ...
Shimin Chen, Anastasia Ailamaki, Manos Athanassoul...
MOBISYS
2003
ACM
14 years 6 months ago
Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network
Wireless local-area networks are becoming increasingly popular. They are commonplace on university campuses and inside corporations, and they have started to appear in public area...
Magdalena Balazinska, Paul Castro
PODS
2004
ACM
98views Database» more  PODS 2004»
14 years 6 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher
CAISE
1999
Springer
13 years 10 months ago
A Practical Approach to Access Heterogeneous and Distributed Databases
A common problem within most large corporations nowadays is the diversity of database systems that are employed by their many departments in the development of a product. Usually, ...
Fernando de Ferreira Rezende, Ulrich Hermsen, Geor...