Sciweavers

PVLDB
2016
63views Cryptology» more  PVLDB 2016»
9 years 11 months ago
Repairing Data through Regular Expressions
Since regular expressions are often used to detect errors in sequences such as strings or date, it is natural to use them for data repair. Motivated by this, we propose a data rep...
Zeyu Li, Hongzhi Wang, Wei Shao, Jianzhong Li, Hon...
PVLDB
2016
72views Cryptology» more  PVLDB 2016»
9 years 11 months ago
A Shifting Bloom Filter Framework for Set Queries
Set queries are fundamental operations in computer systems and applications. This paper addresses the fundamental problem of designing a probabilistic data structure that can quic...
Tong Yang, Alex X. Liu, Muhammad Shahzad, Yuankun ...
PVLDB
2016
80views Cryptology» more  PVLDB 2016»
9 years 11 months ago
Inferray: fast in-memory RDF inference
The advent of semantic data on the Web requires efficient reasoning systems to infer RDF and OWL data. The linked nature and the huge volume of data entail efficiency and scalabil...
Julien Subercaze, Christophe Gravier, Jules Cheval...
PVLDB
2016
77views Cryptology» more  PVLDB 2016»
9 years 11 months ago
SlimShot: In-Database Probabilistic Inference for Knowledge Bases
Increasingly large Knowledge Bases are being created, by crawling the Web or other corpora of documents, and by extracting facts and relations using machine learning techniques. T...
Eric Gribkoff, Dan Suciu
PVLDB
2016
121views Cryptology» more  PVLDB 2016»
9 years 11 months ago
BCC: Reducing False Aborts in Optimistic Concurrency Control with Low Cost for In-Memory Databases
The Optimistic Concurrency Control (OCC) method has been commonly used for in-memory databases to ensure transaction serializability — a transaction will be aborted if its read ...
Yuan Yuan, Kaibo Wang, Rubao Lee, Xiaoning Ding, J...
PVLDB
2016
74views Cryptology» more  PVLDB 2016»
9 years 11 months ago
Exploiting Equality Generating Dependencies in Checking Chase Termination
The chase is a well-known algorithm with a wide range of applications in data exchange, data cleaning, data integration, query optimization, and ontological reasoning. Since the c...
Marco Calautti, Sergio Greco, Cristian Molinaro, I...
PVLDB
2016
108views Cryptology» more  PVLDB 2016»
9 years 11 months ago
A General-Purpose Query-Centric Framework for Querying Big Graphs
Pioneered by Google’s Pregel, many distributed systems have been developed for large-scale graph analytics. These systems employ a user-friendly “think like a vertex” progra...
Da Yan, James Cheng, M. Tamer Özsu, Fan Yang,...
PVLDB
2016
79views Cryptology» more  PVLDB 2016»
9 years 11 months ago
Scalable Package Queries in Relational Database Systems
Traditional database queries follow a simple model: they define constraints that each tuple in the result must satisfy. This model is computationally efficient, as the database ...
Matteo Brucato, Juan Felipe Beltran, Azza Abouzied...
PVLDB
2016
81views Cryptology» more  PVLDB 2016»
9 years 11 months ago
Leveraging Lock Contention to Improve OLTP Application Performance
Locking is one of the predominant costs in transaction processing. While much work has focused on designing efficient concurrency control mechanisms, not much has been done on un...
Cong Yan, Alvin Cheung
PRL
2016
70views Cryptology» more  PRL 2016»
9 years 11 months ago
Minimalistic CNN-based ensemble model for gender prediction from face images
Despite being extensively studied in the literature, the problem of gender recognition from face images remains difficult when dealing with unconstrained images in a cross-dataset...
Grigory Antipov, Sid-Ahmed Berrani, Jean-Luc Dugel...