Sciweavers

7607 search results - page 1469 / 1522
» Querying data provenance
Sort
View
SIGMOD
2006
ACM
89views Database» more  SIGMOD 2006»
15 years 10 months ago
Testing database applications
Testing of database applications is crucial for ensuring high software quality as undetected faults can result in unrecoverable data corruption. The problem of database applicatio...
Carsten Binnig, Donald Kossmann, Eric Lo
SIGMOD
2005
ACM
166views Database» more  SIGMOD 2005»
15 years 10 months ago
Substructure Similarity Search in Graph Databases
Advanced database systems face a great challenge raised by the emergence of massive, complex structural data in bioinformatics, chem-informatics, and many other applications. The ...
Xifeng Yan, Philip S. Yu, Jiawei Han
SIGMOD
2002
ACM
93views Database» more  SIGMOD 2002»
15 years 10 months ago
Implementing database operations using SIMD instructions
Modern CPUs have instructions that allow basic operations to be performed on several data elements in parallel. These instructions are called SIMD instructions, since they apply a...
Jingren Zhou, Kenneth A. Ross
PODS
2004
ACM
158views Database» more  PODS 2004»
15 years 10 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
EDBT
2008
ACM
122views Database» more  EDBT 2008»
15 years 10 months ago
Semantic peer, here are the neighbors you want!
Peer Data Management Systems (PDMSs) have been introduced as a solution to the problem of large-scale sharing of semantically rich data. A PDMS consists of semantic peers connecte...
Wilma Penzo, Stefano Lodi, Federica Mandreoli, Ric...
« Prev « First page 1469 / 1522 Last » Next »