Sciweavers

5344 search results - page 426 / 1069
» Privacy-Preserving Set Operations
Sort
View
121
Voted
EDBT
2006
ACM
124views Database» more  EDBT 2006»
16 years 5 months ago
Physical Design Refinement: The "Merge-Reduce" Approach
Abstract. Physical database design tools rely on a DBA-provided workload to pick an "optimal" set of indexes and materialized views. Such an approach fails to capture sce...
Nicolas Bruno, Surajit Chaudhuri
ICFP
2005
ACM
16 years 5 months ago
A logical analysis of aliasing in imperative higher-order functions
We present a compositional program logic for call-by-value imperative higher-order functions with general forms of aliasing, which can arise from the use of reference names as fun...
Martin Berger, Kohei Honda, Nobuko Yoshida
ICFP
2003
ACM
16 years 5 months ago
A sound and complete axiomatization of delimited continuations
The shift and reset operators, proposed by Danvy and Filinski, are powerful control primitives for capturing delimited continuations. Delimited continuation is a similar concept a...
Yukiyoshi Kameyama, Masahito Hasegawa
ICDT
2010
ACM
180views Database» more  ICDT 2010»
16 years 2 months ago
Foundations of SPARQL Query Optimization
We study fundamental aspects related to the efficient processing of the SPARQL query language for RDF, proposed by the W3C to encode machine-readable information in the Semantic W...
Michael Schmidt, Michael Meier, Georg Lausen
SDM
2009
SIAM
223views Data Mining» more  SDM 2009»
16 years 2 months ago
Context Aware Trace Clustering: Towards Improving Process Mining Results.
Process Mining refers to the extraction of process models from event logs. Real-life processes tend to be less structured and more flexible. Traditional process mining algorithms...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...