Sciweavers

19798 search results - page 3791 / 3960
» Is Structural Subtyping Useful
Sort
View
129
Voted
PODS
2006
ACM
137views Database» more  PODS 2006»
16 years 4 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash
PODS
2006
ACM
196views Database» more  PODS 2006»
16 years 4 months ago
The containment problem for REAL conjunctive queries with inequalities
Query containment is a fundamental algorithmic problem in database query processing and optimization. Under set semantics, the query-containment problem for conjunctive queries ha...
T. S. Jayram, Phokion G. Kolaitis, Erik Vee
EDBT
2008
ACM
111views Database» more  EDBT 2008»
16 years 4 months ago
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
Micro-data protection is a hot topic in the field of Statistical Disclosure Control (SDC), that has gained special interest after the disclosure of 658000 queries by the AOL searc...
Agusti Solanas, Francesc Sebé, Josep Doming...
ICSE
2005
IEEE-ACM
16 years 4 months ago
Automatic generation and maintenance of correct spreadsheets
Existing spreadsheet systems allow users to change cells arbitrarily, which is a major source of spreadsheet errors. We propose a system that prevents errors in spreadsheets by re...
Martin Erwig, Robin Abraham, Irene Cooperstein, St...
ICSE
2005
IEEE-ACM
16 years 4 months ago
Tool support for just-in-time architecture reconstruction and evaluation: an experience report
The need for software architecture evaluation has drawn considerable attention in recent years. In practice, this is a challenging exercise for two main reasons. First, in deploye...
Ian Gorton, Liming Zhu
« Prev « First page 3791 / 3960 Last » Next »