Sciweavers

1830 search results - page 231 / 366
» Implementing a Tamper-Evident Database System
Sort
View
VLDB
2007
ACM
181views Database» more  VLDB 2007»
16 years 1 months ago
STAR: Self-Tuning Aggregation for Scalable Monitoring
We present STAR, a self-tuning algorithm that adaptively sets numeric precision constraints to accurately and efficiently answer continuous aggregate queries over distributed data...
Navendu Jain, Michael Dahlin, Yin Zhang, Dmitry Ki...
117
Voted
DASFAA
2009
IEEE
125views Database» more  DASFAA 2009»
15 years 8 months ago
Flexibility as a Service
Abstract. The lack of flexibility is often seen as an inhibitor for the successful application of workflow technology. Many researchers have proposed different ways of addressin...
Wil M. P. van der Aalst, Michael Adams, Arthur H. ...
93
Voted
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
15 years 6 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai
DBKDA
2010
IEEE
169views Database» more  DBKDA 2010»
15 years 6 months ago
XLeaf: Twig Evaluation with Skipping Loop Joins and Virtual Nodes
Abstract—XML indexing and search has become an important topic, and twig joins are key building blocks in XML search systems. This paper describes a novel approach using a nested...
Nils Grimsmo, Truls Amundsen Bjørklund, &Os...
119
Voted
SYRCODIS
2007
72views Database» more  SYRCODIS 2007»
15 years 2 months ago
An XML-to-Relational User-Driven Mapping Strategy Based on Similarity and Adaptivity
As XML has become a standard for data representation, it is inevitable to propose and implement techniques for efficient managing of XML data. A natural alternative is to exploit...
Irena Mlynkova