Sciweavers

1830 search results - page 297 / 366
» Implementing a Tamper-Evident Database System
Sort
View
102
Voted
EDBT
2010
ACM
151views Database» more  EDBT 2010»
15 years 5 months ago
Warm cache costing: a feedback optimization technique for buffer pool aware costing
Most modern RDBMS depend on the query processing optimizer’s cost model to choose the best execution plan for a given query. Since the physical IO (PIO) is a costly operation to...
H. S. Ramanujam, Edwin Seputis
SIGMOD
1993
ACM
150views Database» more  SIGMOD 1993»
15 years 4 months ago
Predicate Migration: Optimizing Queries with Expensive Predicates
The traditional focus of relational query optimization schemes has been on the choice of join methods and join orders. Restrictions have typically been handled in query optimizers ...
Joseph M. Hellerstein, Michael Stonebraker
227
Voted
SIGMOD
2009
ACM
250views Database» more  SIGMOD 2009»
16 years 26 days ago
Query processing techniques for solid state drives
Solid state drives perform random reads more than 100x faster than traditional magnetic hard disks, while offering comparable sequential read and write bandwidth. Because of their...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...
115
Voted
WWW
2008
ACM
16 years 1 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
16 years 26 days ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...