default search action
ACM Transactions on Database Systems (TODS) , Volume 33
Volume 33, Number 1, March 2008
- Vagelis Hristidis, Heasoo Hwang, Yannis Papakonstantinou:
Authority-based keyword search in databases. 1:1-1:40 - Charu C. Aggarwal, Philip S. Yu:
On static and dynamic methods for condensation-based privacy-preserving data mining. 2:1-2:39 - Magdalena Balazinska, Hari Balakrishnan, Samuel Madden, Michael Stonebraker:
Fault-tolerance in the borealis distributed stream processing system. 3:1-3:44 - Wenfei Fan, Philip Bohannon:
Information preserving XML schema embedding. 4:1-4:44 - Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandros Labrinidis, Kirk Pruhs:
Algorithms and metrics for processing multiple heterogeneous continuous queries. 5:1-5:44
Volume 33, Number 2, June 2008
- Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios Kementsietsidis:
Conditional functional dependencies for capturing data inconsistencies. 6:1-6:48 - Edwin H. Jacox, Hanan Samet:
Metric space similarity joins. 7:1-7:38 - Bingsheng He, Qiong Luo:
Cache-oblivious databases: Limitations and opportunities. 8:1-8:42 - Graham Cormode, Minos N. Garofalakis:
Approximate continuous querying over distributed streams. 9:1-9:39 - Thomas Eiter, Michael Fink, Gianluigi Greco, Domenico Lembo:
Repair localization for query answering from inconsistent databases. 10:1-10:51 - Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wang Chiew Tan:
Quasi-inverses of schema mappings. 11:1-11:52 - Donghui Zhang, Alexander Markowetz, Vassilis J. Tsotras, Dimitrios Gunopulos, Bernhard Seeger:
On computing temporal aggregates with range predicates. 12:1-12:39
Volume 33, Number 3, August 2008
- Mohamed A. Soliman, Ihab F. Ilyas, Kevin Chen-Chuan Chang:
Probabilistic top-k and ranking-aggregate queries. 13:1-13:54 - Yiping Ke, James Cheng, Wilfred Ng:
Correlated pattern mining in quantitative databases. 14:1-14:45 - Florin Rusu, Alin Dobra:
Sketches for size of join estimation. 15:1-15:46 - Fei Xu, Christopher M. Jermaine, Alin Dobra:
Confidence bounds for sampling-based group by estimates. 16:1-16:44 - Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan:
Workload-aware anonymization techniques for large-scale datasets. 17:1-17:47 - Panagiotis Karras, Nikos Mamoulis:
Hierarchical synopses with optimal error guarantees. 18:1-18:53 - Nicholas Lester, Alistair Moffat, Justin Zobel:
Efficient online index construction for text databases. 19:1-19:33
Volume 33, Number 4, November 2008
- Z. Meral Özsoyoglu:
Foreword to TODS SIGMOD/PODS/ICDT 2007 special issue. 20:1-20:2 - Beng Chin Ooi:
Introduction to ACM SIGMOD 2007 special section. 21:1-21:2 - Sergey Melnik, Atul Adya, Philip A. Bernstein:
Compiling mappings to bridge applications and databases. 22:1-22:50 - Chris Jermaine, Subramanian Arumugam, Abhijit Pol, Alin Dobra:
Scalable approximate query processing with the DBO engine. 23:1-23:54 - Leonid Libkin:
Introduction to the PODS 2007 special section. 24:1 - Wenfei Fan, Floris Geerts, Frank Neven:
Expressiveness and complexity of XML publishing transducers. 25:1-25:49 - T. S. Jayram, Andrew McGregor, S. Muthukrishnan, Erik Vee:
Estimating statistical aggregates on probabilistic data streams. 26:1-26:30 - Thomas Schwentick, Dan Suciu:
Introduction to ICDT 2007 special section. 27:1 - Peter Buneman, James Cheney, Stijn Vansummeren:
On the expressiveness of implicit provenance in query and update languages. 28:1-28:47 - Giorgio Ghelli, Kristoffer Høgsbro Rose, Jérôme Siméon:
Commutativity analysis for XML updates. 29:1-29:47 - Kyriacos E. Pavlou, Richard T. Snodgrass:
Forensic analysis of database tampering. 30:1-30:47 - Ilaria Bartolini, Paolo Ciaccia, Marco Patella:
Efficient sort-based skyline evaluation. 31:1-31:49
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.