


default search action
ACM Transactions on Database Systems, Volume 39
Volume 39, Number 1, January 2014
- Egor V. Kostylev

, Juan L. Reutter
, András Z. Salamon
:
Classification of annotation semirings over containment of conjunctive queries. 1:1-1:39 - Ke Yi, Lu Wang

, Zhewei Wei:
Indexing for summary queries: Theory and practice. 2:1-2:39 - Daniel Kifer

, Ashwin Machanavajjhala:
Pufferfish: A framework for mathematical privacy definitions. 3:1-3:36 - Shuai Ma, Yang Cao, Wenfei Fan

, Jinpeng Huai, Tianyu Wo:
Strong simulation: Capturing topology in graph pattern matching. 4:1-4:46 - Wolfgang Gatterbauer

, Dan Suciu
:
Oblivious bounds on the probability of boolean functions. 5:1-5:34 - Qiong Fang, Wilfred Ng

, Jianlin Feng, Yuliang Li:
Mining order-preserving submatrices from probabilistic matrices. 6:1-6:43 - Jiannan Wang, Guoliang Li, Jianhua Feng:

Extending string similarity join to tolerant fuzzy token matching. 7:1-7:45 - Siddhartha Sen, Robert Endre Tarjan:

Deletion without rebalancing in multiway search trees. 8:1-8:14 - Yakov Nekrich

:
Efficient range searching for categorical and plain data. 9:1-9:21
Volume 39, Number 2, May 2014
- Pan Xu, Srikanta Tirthapura

:
Optimality of Clustering Properties of Space-Filling Curves. 10:1-10:27 - Alexander Thomson, Thaddeus Diamond, Shu-Chun Weng, Kun Ren, Philip Shao, Daniel J. Abadi

:
Fast Distributed Transactions and Strongly Consistent Replication for OLTP Database Systems. 11:1-11:39 - Tomasz Nykiel, Michalis Potamias, Chaitanya Mishra, George Kollios

, Nick Koudas:
Sharing across Multiple MapReduce Jobs. 12:1-12:46 - Ying Lu, Jiaheng Lu

, Gao Cong
, Wei Wu, Cyrus Shahabi:
Efficient Algorithms and Cost Models for Reverse Spatial-Keyword k-Nearest Neighbor Search. 13:1-13:46 - Ilaria Bartolini

, Paolo Ciaccia
, Marco Patella:
Domination in the Probabilistic World: Computing Skylines for Arbitrary Correlations and Ranking Semantics. 14:1-14:45 - Ting Deng

, Wenfei Fan
:
On the Complexity of Query Result Diversification. 15:1-15:46 - Nikos Giatrakos

, Antonios Deligiannakis, Minos N. Garofalakis, Izchak Sharfman, Assaf Schuster:
Distributed Geometric Query Monitoring Using Prediction Models. 16:1-16:42 - Chuan Lei

, Elke A. Rundensteiner:
Robust Distributed Query Processing for Streaming Data. 17:1-17:45
Volume 39, Number 3, September 2014
- Christian S. Jensen

:
Editorial. 18:1 - Rui Zhang

, Jianzhong Qi
, Martin Stradling, Jin Huang:
Towards a Painless Index for Spatial Objects. 19:1-19:42 - Nikolaj Tatti

, Fabian Moerchen, Toon Calders:
Finding Robust Itemsets under Subsampling. 20:1-20:27 - Dong-Wan Choi, Chin-Wan Chung, Yufei Tao

:
Maximizing Range Sum in External Memory. 21:1-21:44 - Vishesh Karwa, Sofya Raskhodnikova, Adam D. Smith, Grigory Yaroslavtsev:

Private Analysis of Graph Structure. 22:1-22:33 - HweeHwa Pang

, Xuhua Ding
:
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data. 23:1-23:40 - Francesco M. Malvestuto:

A Join-Like Operator to Combine Data Cubes and Answer Queries from Multiple Data Cubes. 24:1-24:31 - Georg Gottlob

, Giorgio Orsi, Andreas Pieris:
Query Rewriting and Optimization for Ontological Databases. 25:1-25:46
Volume 39, Number 4, December 2014
- Christian S. Jensen

:
Foreword to Invited Articles Issue. 26:1-26:2
- Xiaocheng Hu, Yufei Tao

, Chin-Wan Chung:
I/O-Efficient Algorithms on Triangle Listing and Counting. 27:1-27:30 - Marcelo Arenas, Jonny Daenen, Frank Neven

, Martín Ugarte, Jan Van den Bussche
, Stijn Vansummeren:
Discovering XSD Keys from XML Data. 28:1-28:49 - Hyungsoo Jung, Hyuck Han, Alan D. Fekete, Gernot Heiser, Heon Young Yeom:

A Scalable Lock Manager for Multicores. 29:1-29:29 - Stavros Papadopoulos, Graham Cormode

, Antonios Deligiannakis, Minos N. Garofalakis:
Lightweight Query Authentication on Streams. 30:1-30:45
- Amélie Gheerbrant, Leonid Libkin

, Cristina Sirangelo:
Naïve Evaluation of Queries over Incomplete Databases. 31:1-31:42 - Benny Kimelfeld, Phokion G. Kolaitis:

The Complexity of Mining Maximal Frequent Subgraphs. 32:1-32:33 - Meghyn Bienvenu

, Balder ten Cate, Carsten Lutz
, Frank Wolter
:
Ontology-Based Data Access: A Study through Disjunctive Datalog, CSP, and MMSNP. 33:1-33:44
- Chao Li, Daniel Yang Li, Gerome Miklau, Dan Suciu

:
A Theory of Pricing Private Data. 34:1-34:28 - Susan B. Davidson, Sanjeev Khanna, Tova Milo, Sudeepa Roy:

Top-k and Clustering with Noisy Comparisons. 35:1-35:39

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














