Sciweavers

2309 search results - page 269 / 462
» Using Meta-Structures in Database Design
Sort
View
235
Voted
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
16 years 4 months ago
Ranking distributed probabilistic data
Ranking queries are essential tools to process large amounts of probabilistic data that encode exponentially many possible deterministic instances. In many applications where unce...
Feifei Li, Ke Yi, Jeffrey Jestes
222
Voted
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
16 years 4 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
130
Voted
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 10 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
139
Voted
CIVR
2007
Springer
178views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Layout indexing of trademark images
Ensuring the uniqueness of trademark images and protecting their identities are the most important objectives for the trademark registration process. To prevent trademark infringe...
Reinier H. van Leuken, M. Fatih Demirci, Victoria ...
OOPSLA
2007
Springer
15 years 10 months ago
Scalable omniscient debugging
Omniscient debuggers make it possible to navigate backwards in time within a program execution trace, drastically improving the task of debugging complex applications. Still, they...
Guillaume Pothier, Éric Tanter, José...