enter search term and/or author name
Foreword to TODS SIGMOD/PODS/ICDT 2007 special issue
Z. Meral Özsoyoǧlu
Article No.: 20
Compiling mappings to bridge applications and databases
Sergey Melnik, Atul Adya, Philip A. Bernstein
Article No.: 22
Translating data and data access operations between applications and databases is a longstanding data management problem. We present a novel approach to this problem, in which the relationship between the application data and the persistent...
Scalable approximate query processing with the DBO engine
Chris Jermaine, Subramanian Arumugam, Abhijit Pol, Alin Dobra
Article No.: 23
This article describes query processing in the DBO database system. Like other database systems designed for ad hoc analytic processing, DBO is able to compute the exact answers to queries over a large relational database in a scalable fashion....
Expressiveness and complexity of XML publishing transducers
Wenfei Fan, Floris Geerts, Frank Neven
Article No.: 25
A number of languages have been developed for specifying XML publishing, that is, transformations of relational data into XML trees. These languages generally describe the behaviors of a middleware controller that builds an output tree...
Estimating statistical aggregates on probabilistic data streams
T. S. Jayram, Andrew McGregor, S. Muthukrishnan, Erik Vee
Article No.: 26
The probabilistic stream model was introduced by Jayram et al. . It is a generalization of the data stream model that is suited to handling probabilistic data, where each item of the stream represents a probability distribution over a...
On the expressiveness of implicit provenance in query and update languages
Peter Buneman, James Cheney, Stijn Vansummeren
Article No.: 28
Information describing the origin of data, generally referred to as provenance, is important in scientific and curated databases where it is the basis for the trust one puts in their contents. Since such databases are constructed using...
An effective approach to support XML updates is to use XQuery extended with update operations. This approach results in very expressive languages which are convenient for users but are difficult to optimize or reason about. A crucial question...
Regulations and societal expectations have recently expressed the need to mediate access to valuable databases, even by insiders. One approach is tamper detection via cryptographic hashing. This article shows how to determine when the tampering...
Skyline queries compute the set of Pareto-optimal tuples in a relation, that is, those tuples that are not dominated by any other tuple in the same relation. Although several algorithms have been proposed for efficiently evaluating skyline...