Sciweavers

19798 search results - page 3774 / 3960
» Is Structural Subtyping Useful
Sort
View
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 5 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
ICIP
2004
IEEE
16 years 5 months ago
Rate-distortion analysis of random access for compressed light fields
Image-based rendering data sets, such as light fields, require efficient compression due to their large data size, but also easy random access when rendering from the data set. Ef...
Prashant Ramanathan, Bernd Girod
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
16 years 5 months ago
An Inflationary Fixed Point Operator in XQuery
ct The backbone of the XML data model, namely ordered, unranked trees, is inherently recursive and it is natural to equip the associated languages with constructs that can query su...
Loredana Afanasiev, Torsten Grust, Maarten Marx, J...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
16 years 5 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
217
Voted
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
16 years 5 months ago
Scalable Peer-to-Peer Web Retrieval with Highly Discriminative Keys
The suitability of Peer-to-Peer (P2P) approaches for fulltext web retrieval has recently been questioned because of the claimed unacceptable bandwidth consumption induced by retri...
Ivana Podnar, Martin Rajman, Toan Luu, Fabius Klem...
« Prev « First page 3774 / 3960 Last » Next »