No abstract available.
Querying websites using compact skeletons
Several commercial applications, such as online comparison shopping and process automation, require integrating information that is scattered across multiple websites or XML documents. Much research has been devoted to this problem, resulting in several ...
Flexible queries over semistructured data
Flexible queries facilitate, in a novel way, easy and concise querying of databases that have varying structures. Two different semantics, flexible and semiflexible, are introduced and investigated. The complexity of evaluating queries under the two ...
Multiobjective query optimization
The optimization of queries in distributed database systems is known to be subject to delicate trade-offs. For example, the Mariposa database system allows users to specify a desired delay-cost tradeoff (that is, to supply a decreasing function u(d), ...
Pipelining in multi-query optimization
Database systems frequently have to execute a set of related queries, which share several common subexpressions. Multi-query optimization exploits this, by finding evaluation plans that share common results. Current approaches to multi-query ...
Optimization of sequence queries in database systems
The need to search for complex and recurring patterns in database sequences is shared by many applications. In this paper, we discuss how to express and support efficiently sophisticated sequential pattern queries in databases. Thus, we first introduce ...
The parameterized complexity of database queries
This paper gives a short introduction into parameterized complexity theory, aimed towards database theorists interested in this area. The main results presented here classify the evaluation of first-order queries and conjunctive queries as hard ...
Relaxed multi-way trees with group updates
Data structures with relaxed balance differ from standard structures in that rebalancing can be delayed and interspersed with updates. This gives extra flexibility in both sequential and parallel applications.
We study the version of multi-way trees ...
Optimal aggregation algorithms for middleware
Assume that each object in a database has m grades, or scores, one for each of m attributes. For example, an object can have a color grade, that tells how red it is, and a shape grade, that tells how round it is. For each attribute, there is a sorted ...
On XML integrity constraints in the presence of DTDs
The paper investigates XML document specifications with DTDs and integrity constraints, such as keys and foreign keys. We study the consistency problem of checking whether a given specification is meaningful: that is, whether there exists an XML ...
Extended path expressions of XML
Query languages for XML often use path expressions to locate elements in XML documents. Path expressions are regular expressions such that underlying alphabets represent conditions on nodes. Path expressions represent conditions on paths from the root, ...
XML with data values: typechecking revisited
We investigate the type checking problem for XML queries: statically verifying that every answer to a query conforms to a given output DTD, for inputs satisfying a given input DTD. This problem had been studied by a subset of the authors in a simplified ...
Representing and querying XML with incomplete information
We study the representation and querying of XML with incomplete information. We consider a simple model for XML data and their DTDs, a very simple query language, and a representation system for incomplete information in the spirit of the ...
Querying partially sound and complete data sources
When gathering data from multiple data sources, users need uniform, transparent access to data. Also, when extracting data from several independent, often only partially sound and complete data sources, it is useful to present users with meta-...
On computing functions with uncertainty
We study the problem of computing a function f(x1,…, xn) given that the actual values of the variables xi's are known only with some uncertainty. For each variable xi, an interval Ii is known such that the value of xi is guaranteed to fall within this ...
String operations in query languages
We study relational calculi with support for string operations. While SQL restricts the ability to mix string pattern-matching and relational operations, prior proposals for embedding SQL in a compositional calculus were based on adding the operation of ...
Robbers, marshals, and guards: game theoretic and logical characterizations of hypertree width
In a previous paper [10], the authors introduced the notion of hypertree decomposition and the corresponding concept of hypertree width and showed that the conjunctive queries whose hypergraphs have bounded hypertree-width can be evaluated in polynomial ...
On the complexity of join predicates
We consider the complexity of join problems, focusing on equijoins, spatial-overlap joins, and set-containment joins. We use a graph pebbling model to characterize these joins combinatorially, by the length of their optimal pebbling strategies and ...
Equivalences among aggregate queries with negation
Query equivalence is investigated for disjunctive aggregate queries with negated subgoals, constants and comparisons. A full characterization of equivalence is given for the aggregation functions count, max, sum, prod, top2 and parity. A related problem ...
Optimal and approximate computation of summary statistics for range aggregates
Fast estimates for aggregate queries are useful in database query optimization, approximate query answering and online query processing. Hence, there has been a lot of focus on “selectivity estimation”, that is, computing summary statistics on the ...
Efficient computation of temporal aggregates with range predicates
A temporal aggregation query is an important but costly operation for applications that maintain time-evolving data (data warehouses, temporal databases, etc.). Due to the large volume of such data, performance improvements for temporal aggregation ...
The challenges of delivering content on the Internet
In this talk, we will give an overview of how content is distributed on the internet, with an emphasis on the approach being used by Akamai. We will describe some of the technical challenges involved in operating a network of thousands of content ...
On the design and quantification of privacy preserving data mining algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms which preserve user privacy. A recently proposed technique addresses the ...
On the effects of dimensionality reduction on high dimensional similarity search
The dimensionality curse has profound effects on the effectiveness of high-dimensional similarity indexing from the performance perspective. One of the well known techniques for improving the indexing performance is the method of dimensionality ...
A condensed representation to find frequent patterns
Given a large set of data, a common data mining problem is to extract the frequent patterns occurring in this set. The idea presented in this paper is to extract a condensed representation of the frequent patterns called disjunction-free sets, instead ...
Database-friendly random projections
A classic result of Johnson and Lindenstrauss asserts that any set of n points in d-dimensional Euclidean space can be embedded into k-dimensional Euclidean space where k is logarithmic in n and independent of d so that all pairwise distances are ...
Two-dimensional substring indexing
As databases have expanded in scope to storing string data (XML documents, product catalogs), it has become increasingly important to search databases based on matching substrings, often on multiple, correlated dimensions. While string B-trees are I/O ...
Process locking: a protocol based on ordered shared locks for the execution of transactional processes
In this paper, we propose process locking, a dynamic scheduling protocol based on ideas of ordered shared locks, that allows for the correct concurrent and fault-tolerant execution of transactional processes. Transactional processes are well defined, ...
Cited By
- Wang Q, Luo Q and Wang Y (2024). Relational Algorithms for Top-k Query Evaluation, Proceedings of the ACM on Management of Data, 2:3, (1-27), Online publication date: 29-May-2024.
-
Widmann J, Weist M and Sawodny O (2023). A Transport Simulation-Based Analysis of Charging Station Occupation for Long-Distance Route Planning of Battery Electric Vehicles 2023 IEEE/SICE International Symposium on System Integration (SII), 10.1109/SII55687.2023.10039170, 979-8-3503-9868-7, (1-6)
-
TUDOR N (2010). Cache Pattern with Multi-Queries, Advances in Electrical and Computer Engineering, 10.4316/aece.2010.02014, 10:2, (82-86),
Index Terms
- Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
PODS '19 | 87 | 29 | 33% |
PODS '17 | 101 | 29 | 29% |
PODS '16 | 94 | 31 | 33% |
PODS '15 | 80 | 25 | 31% |
PODS '14 | 67 | 22 | 33% |
PODS '13 | 97 | 24 | 25% |
PODS '12 | 101 | 26 | 26% |
PODS '11 | 113 | 25 | 22% |
PODS '10 | 113 | 27 | 24% |
PODS '09 | 97 | 26 | 27% |
PODS '08 | 159 | 28 | 18% |
PODS '07 | 187 | 28 | 15% |
PODS '06 | 185 | 35 | 19% |
PODS '03 | 136 | 27 | 20% |
PODS '02 | 109 | 24 | 22% |
PODS '01 | 99 | 26 | 26% |
PODS '00 | 119 | 26 | 22% |
PODS '99 | 116 | 32 | 28% |
PODS '98 | 119 | 28 | 24% |
PODS '97 | 118 | 23 | 19% |
PODS '96 | 84 | 22 | 26% |
PODS '95 | 94 | 25 | 27% |
PODS '94 | 117 | 28 | 24% |
PODS '93 | 115 | 26 | 23% |
Overall | 2,707 | 642 | 24% |