Sciweavers

1497 search results - page 149 / 300
» Online Negative Databases
Sort
View
SIGMOD
2002
ACM
84views Database» more  SIGMOD 2002»
16 years 4 months ago
Skew handling techniques in sort-merge join
Joins are among the most frequently executed operations. Several fast join algorithms have been developed and extensively studied; these can be categorized as sort-merge, hash-bas...
Wei Li, Dengfeng Gao, Richard T. Snodgrass
PODS
2001
ACM
85views Database» more  PODS 2001»
16 years 4 months ago
On XML Integrity Constraints in the Presence of DTDs
The paper investigates XML document speci cations with DTDs and integrity constraints, such as keysand foreign keys. We study the consistency problem of checking whether a given s...
Wenfei Fan, Leonid Libkin
145
Voted
PODS
2004
ACM
98views Database» more  PODS 2004»
16 years 4 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher
130
Voted
ACSAC
2008
IEEE
15 years 11 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
DASFAA
2008
IEEE
150views Database» more  DASFAA 2008»
15 years 11 months ago
Approximate Clustering of Time Series Using Compact Model-Based Descriptions
Clustering time series is usually limited by the fact that the length of the time series has a significantly negative influence on the runtime. On the other hand, approximative c...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...