Sciweavers

10909 search results - page 2024 / 2182
» Evaluating Backup Algorithms
Sort
View
SIGMOD
2008
ACM
107views Database» more  SIGMOD 2008»
16 years 4 months ago
Outlier-robust clustering using independent components
How can we efficiently find a clustering, i.e. a concise description of the cluster structure, of a given data set which contains an unknown number of clusters of different shape ...
Christian Böhm, Christos Faloutsos, Claudia P...
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
16 years 4 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
16 years 4 months ago
Adaptive location constraint processing
An important problem for many location-based applications is the continuous evaluation of proximity relations among moving objects. These relations express whether a given set of ...
Zhengdao Xu, Hans-Arno Jacobsen
SIGMOD
2007
ACM
219views Database» more  SIGMOD 2007»
16 years 4 months ago
Efficient exploitation of similar subexpressions for query processing
Complex queries often contain common or similar subexpressions, either within a single query or among multiple queries submitted as a batch. If so, query execution time can be imp...
Jingren Zhou, Johann Christoph Freytag, Per-Å...
SIGMOD
2007
ACM
121views Database» more  SIGMOD 2007»
16 years 4 months ago
Execution strategies for SQL subqueries
Optimizing SQL subqueries has been an active area in database research and the database industry throughout the last decades. Previous work has already identified some approaches ...
César A. Galindo-Legaria, Milind Joshi, Mos...
« Prev « First page 2024 / 2182 Last » Next »