Sciweavers

6650 search results - page 115 / 1330
» Mutating database queries
Sort
View
PODS
2006
ACM
121views Database» more  PODS 2006»
16 years 3 months ago
On the efficiency of checking perfect privacy
Privacy-preserving query-answering systems answer queries while provably guaranteeing that sensitive information is kept secret. One very attractive notion of privacy is perfect p...
Ashwin Machanavajjhala, Johannes Gehrke
134
Voted
DBISP2P
2005
Springer
132views Database» more  DBISP2P 2005»
15 years 5 months ago
Publish/Subscribe with RDF Data over Large Structured Overlay Networks
Abstract. We study the problem of evaluating RDF queries over structured overlay networks. We consider the publish/subscribe scenario where nodes subscribe with long-standing queri...
Erietta Liarou, Stratos Idreos, Manolis Koubarakis

Publication
220views
17 years 3 months ago
Exploiting the Impact of Database System Configuration Parameters: A Design of Experiments Approach
Tuning database system configuration parameters to proper values according to the expected query workload plays a very important role in determining DBMS performance. However, the ...
Biplob K. Debnath, Mohamed F. Mokbel, David J. Lil...
ICDE
1999
IEEE
151views Database» more  ICDE 1999»
16 years 4 months ago
Data Integration by Describing Sources with Constraint Databases
We develop a data integration approach for the efficient evaluation of queries over autonomous source databases. The approach is based on some novel applications and extensions of...
Xun Cheng, Guozhu Dong, Tzekwan Lau, Jianwen Su
220
Voted
ICDT
2009
ACM
119views Database» more  ICDT 2009»
16 years 4 months ago
Incremental XPath evaluation
We study the problem of incrementally maintaining an XPath query on an XML database under updates. The updates we consider are node insertion, node deletion, and node relabeling. ...
Henrik Björklund, Marcel Marquardt, Wim Marte...