Sciweavers

1394 search results - page 102 / 279
» Executing Nested Queries
Sort
View
DAWAK
2010
Springer
15 years 5 months ago
Experience in Extending Query Engine for Continuous Analytics
: Experience in Extending Query Engine for Continuous Analytics Qiming Chen, Meichun Hsu HP Laboratories HPL-2010-44 In-Database Stream Processing Combining data warehousing and s...
Qiming Chen, Meichun Hsu
EDBT
2008
ACM
113views Database» more  EDBT 2008»
16 years 4 months ago
Ensuring correctness over untrusted private database
In this paper we address the problem of ensuring the correctness of query results returned by an untrusted private database. The database owns the data and may modify it at any ti...
Sarvjeet Singh, Sunil Prabhakar
140
Voted
ICDE
2007
IEEE
98views Database» more  ICDE 2007»
15 years 10 months ago
Towards Adaptive Costing of Database Access Methods
Most database query optimizers use cost models to identify good query execution plans. Inaccuracies in the cost models can cause query optimizers to select poor plans. In this pap...
Ye Qin, Kenneth Salem, Anil K. Goel
138
Voted
BTW
2005
Springer
91views Database» more  BTW 2005»
15 years 9 months ago
Element Relationship: Exploiting Inline Markup for Better XML Retrieval
: With the increasing popularity of semi-structured documents (particularly in the form of XML) for knowledge management, it is important to create tools that use the additional in...
Philipp Dopichaj
161
Voted
CCS
2008
ACM
15 years 6 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...