Sciweavers

4081 search results - page 737 / 817
» Metaprogramming for Relational Databases
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
16 years 22 days ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
EDBT
2002
ACM
120views Database» more  EDBT 2002»
16 years 22 days ago
Hyperdatabases: Infrastructure for the Information Space
The amount of stored information is exploding while, at the same time, tools for accessing relevant information are rather under-developed. Usually, all users have a pre-defined vi...
Hans-Jörg Schek
107
Voted
EDBT
2006
ACM
174views Database» more  EDBT 2006»
16 years 22 days ago
Fast Computation of Reachability Labeling for Large Graphs
The need of processing graph reachability queries stems from many applications that manage complex data as graphs. The applications include transportation network, Internet traffic...
Jiefeng Cheng, Jeffrey Xu Yu, Xuemin Lin, Haixun W...
98
Voted
EDBT
2008
ACM
122views Database» more  EDBT 2008»
16 years 22 days ago
Semantic peer, here are the neighbors you want!
Peer Data Management Systems (PDMSs) have been introduced as a solution to the problem of large-scale sharing of semantically rich data. A PDMS consists of semantic peers connecte...
Wilma Penzo, Stefano Lodi, Federica Mandreoli, Ric...
95
Voted
EDBT
2008
ACM
159views Database» more  EDBT 2008»
16 years 22 days ago
Deleting index entries from compliance storage
In response to regulatory focus on secure retention of electronic records, businesses are using magnetic disks configured as write-once read-many (WORM) compliance storage devices...
Soumyadeb Mitra, Marianne Winslett, Nikita Borisov