Sciweavers

1004 search results - page 1 / 201
» Safe Constraint Queries
Sort
View
PODS
1998
ACM
87views Database» more  PODS 1998»
15 years 5 months ago
Safe Constraint Queries
Michael Benedikt, Leonid Libkin
100
Voted
IS
2002
15 years 22 days ago
Pushing extrema aggregates to optimize logic queries
In this paper, we explore the possibility of transforming queries with minimum and maximum predicates into equivalent queries that can be computed more efficiently. The main contr...
Filippo Furfaro, Sergio Greco, Sumit Ganguly, Carl...
134
Voted
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
16 years 24 days ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
194
Voted
MOZ
2004
Springer
15 years 6 months ago
Playing the Minesweeper with Constraints
We present the design and implementation of a Minesweeper game, augmented with a digital assistant. The assistant uses contraint programming techniques to help the player, and is a...
Raphaël Collet
ICSE
2005
IEEE-ACM
16 years 1 months ago
Safe query objects: statically typed objects as remotely executable queries
When building scalable systems that involve general-purpose computation and persistent data, object-oriented languages and relational databases are often essential components. Yet...
William R. Cook, Siddhartha Rai