Sciweavers

1004 search results - page 15 / 201
» Safe Constraint Queries
Sort
View
157
Voted
SIGMOD
2006
ACM
108views Database» more  SIGMOD 2006»
16 years 16 days ago
Query reformulation with constraints
Alin Deutsch, Lucian Popa, Val Tannen
PODS
2008
ACM
120views Database» more  PODS 2008»
16 years 16 days ago
Query evaluation with soft-key constraints
Abhay Jha, Vibhor Rastogi, Dan Suciu
95
Voted
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
15 years 1 months ago
Differential Privacy and the Fat-Shattering Dimension of Linear Queries
In this paper, we consider the task of answering linear queries under the constraint of differential privacy. This is a general and well-studied class of queries that captures oth...
Aaron Roth
132
Voted
JAPLL
2010
179views more  JAPLL 2010»
14 years 11 months ago
Tractable query answering and rewriting under description logic constraints
Answering queries over an incomplete database w.r.t. a set of constraints is an important computational task with applications in fields as diverse as information integration and ...
Héctor Pérez-Urbina, Boris Motik, Ia...