Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2017
Fast and powerful hashing using tabulation
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yield the desired probabilistic guarantees are often too complicated to be practical. Here, we survey recent results on how simple hashing schemes based on ...
- research-articleAugust 2016
10 optimizations on linear search
The operations side of the story.
- research-articleAugust 2014
Reshaping terrorist networks
Communications of the ACM (CACM), Volume 57, Issue 8Pages 60–69https://doi.org/10.1145/2632661.2632664To destabilize terrorist organizations, the <code>STONE</code> algorithms identify a set of operatives whose removal would maximally reduce lethality.
- research-articleJune 2011
10 rules for scalable performance in 'simple operation' datastores
Communications of the ACM (CACM), Volume 54, Issue 6Pages 72–80https://doi.org/10.1145/1953122.1953144Partition data and operations, keep administration simple, do not assume one size fits all.
-
- research-articleJune 2009
The Claremont report on database research
- Rakesh Agrawal,
- Anastasia Ailamaki,
- Philip A. Bernstein,
- Eric A. Brewer,
- Michael J. Carey,
- Surajit Chaudhuri,
- Anhai Doan,
- Daniela Florescu,
- Michael J. Franklin,
- Hector Garcia-Molina,
- Johannes Gehrke,
- Le Gruenwald,
- Laura M. Haas,
- Alon Y. Halevy,
- Joseph M. Hellerstein,
- Yannis E. Ioannidis,
- Hank F. Korth,
- Donald Kossmann,
- Samuel Madden,
- Roger Magoulas,
- Beng Chin Ooi,
- Tim O'Reilly,
- Raghu Ramakrishnan,
- Sunita Sarawagi,
- Michael Stonebraker,
- Alexander S. Szalay,
- Gerhard Weikum
Communications of the ACM (CACM), Volume 52, Issue 6Pages 56–65https://doi.org/10.1145/1516046.1516062Database research is expanding, with major efforts in system architecture, new languages, cloud services, mobile and virtual worlds, and interplay between structure and text.
- research-articleDecember 2008
Got data?: a guide to data preservation in the information age
Communications of the ACM (CACM), Volume 51, Issue 12Pages 50–56https://doi.org/10.1145/1409360.1409376Tools for surviving a data deluge to ensure your data will be there when you need it.
- research-articleNovember 2008
A tribute to Jim Gray
Communications of the ACM (CACM), Volume 51, Issue 11Pages 54–57https://doi.org/10.1145/1400214.1400230We knew him as both scholar and friend.
- articleSeptember 2006
Tapping the power of text mining
Communications of the ACM (CACM), Volume 49, Issue 9Pages 76–82https://doi.org/10.1145/1151030.1151032Sifting through vast collections of unstructured or semistructured data beyond the reach of data mining tools, text mining tracks information sources, links isolated concepts in distant documents, maps relationships between activities, and helps answer ...
- articleDecember 2004
Semantic blogging and decentralized knowledge management
Communications of the ACM (CACM), Volume 47, Issue 12Pages 47–52https://doi.org/10.1145/1035134.1035164Tapping into the structured metadata in snippets of information gives communities of interest effective access to their collective knowledge.
- articleSeptember 2004
Preserving research data
Communications of the ACM (CACM), Volume 47, Issue 9Pages 27–29https://doi.org/10.1145/1015864.1015881Granting ownership rights to data, as if it were private property, only limits data access without ensuring the benefits of researcher precedence or the rewards for good data collection.
- articleNovember 2003
Features to consider in a data warehousing system
Communications of the ACM (CACM), Volume 46, Issue 11Pages 111–115https://doi.org/10.1145/948383.948389Evaluating and assessing the important distinctions between data processing capability and data currency.