Sciweavers

1039 search results - page 142 / 208
» Query reformulation with constraints
Sort
View
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
15 years 11 months ago
Supporting Generic Cost Models for Wide-Area Stream Processing
— Existing stream processing systems are optimized for a specific metric, which may limit their applicability to diverse applications and environments. This paper presents XFlow...
Olga Papaemmanouil, Ugur Çetintemel, John J...
EDBT
2009
ACM
102views Database» more  EDBT 2009»
15 years 11 months ago
On keys, foreign keys and nullable attributes in relational mapping systems
We consider the following scenario for a mapping system: given a source schema, a target schema, and a set of value correspondences between these two schemas, generate an executab...
Luca Cabibbo
ICSM
2003
IEEE
15 years 9 months ago
Software Architecture Recovery based on Pattern Matching
This paper is a summary of the author’s thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined ar...
Kamran Sartipi
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
15 years 9 months ago
Computing label-constraint reachability in graph databases
Our world today is generating huge amounts of graph data such as social networks, biological networks, and the semantic web. Many of these real-world graphs are edge-labeled graph...
Ruoming Jin, Hui Hong, Haixun Wang, Ning Ruan, Yan...
CIKM
2009
Springer
15 years 9 months ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen