• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 955
Next 10 →

Evaluating Top-k Queries over Web-Accessible Databases

by Amélie Marian, Nicolas Bruno, Luis Gravano - ACM TRANS. ON DATABASE SYSTEMS , 2004
"... ... In this article, we study how to process top-k queries efficiently in this setting, where the attributes for which users specify target values might be handled by external, autonomous sources with a variety of access interfaces. We present a sequential algorithm for processing such queries, but ..."
Abstract - Cited by 253 (15 self) - Add to MetaCart
may impose some restrictions on the type and number of probes that they are willing to accept. We adapt our sequential query processing technique and introduce an efficient algorithm that maximizes sourceaccess parallelism to minimize query response time, while satisfying source-access constraints.

Reconciling Schemas of Disparate Data Sources: A Machine-Learning Approach

by Anhai Doan, Pedro Domingos, Alon Halevy - In SIGMOD Conference , 2001
"... A data-integration system provides access to a multitude of data sources through a single mediated schema. A key bottleneck in building such systems has been the laborious manual construction of semantic mappings between the source schemas and the mediated schema. We describe LSD, a system that empl ..."
Abstract - Cited by 424 (50 self) - Add to MetaCart
A data-integration system provides access to a multitude of data sources through a single mediated schema. A key bottleneck in building such systems has been the laborious manual construction of semantic mappings between the source schemas and the mediated schema. We describe LSD, a system

System Description: Twelf --- A Meta-Logical Framework for Deductive Systems

by Frank Pfenning, Carsten Schurmann - Proceedings of the 16th International Conference on Automated Deduction (CADE-16 , 1999
"... . Twelf is a meta-logical framework for the specification, implementation, and meta-theory of deductive systems from the theory of programming languages and logics. It relies on the LF type theory and the judgments-as-types methodology for specification [HHP93], a constraint logic programming interp ..."
Abstract - Cited by 357 (54 self) - Add to MetaCart
platforms. The current version (1.2) is distributed with a complete manual, example suites, a tutorial in the form of on-line lecture notes [Pfe], and an Emacs interface. Source and binary distributions are accessible via the Twelf home page http://www.cs.cmu.edu/~twelf. 1 The Twelf System The Twelf

Parallel Probing of Web Databases for Top-k Query Processing

by Amélie Marian, Luis Gravano
"... A “top-k query” specifies a set of preferred values for the attributes of a relation and expects as a result the k objects that are “closest” to the given preferences according to some distance function. In many web applications, the relation attributes are only available via probes to autonomous we ..."
Abstract - Add to MetaCart
on the type and number of probes that they are willing to accept. These characteristics of web sources motivate the introduction of parallel top-k query processing strategies, which are the focus of this paper. We present efficient techniques that maximize source-access parallelism to minimize query response

Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints

by Mohammad Nauman, Sohail Khan, Xinwen Zhang
"... Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giving users the ability to install third-party applications poses serious security concerns. While the existing security me ..."
Abstract - Cited by 154 (2 self) - Add to MetaCart
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giving users the ability to install third-party applications poses serious security concerns. While the existing security

Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications

by Kavitha Ranganathan, Ian Foster , 2002
"... In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. Socalled Data Grids seek to harness geographically distributed resources for such large-scale data-intensive problems. Yet ..."
Abstract - Cited by 190 (9 self) - Add to MetaCart
effective scheduling in such environments is challenging, due to a need to address a variety of metrics and constraints (e.g., resource utilization, response time, global and local allocation policies) while dealing with multiple, potentially independent sources of jobs and a large number of storage

A type system for Java bytecode subroutines

by Raymie Stata, Martín Abadi - In Proceedings of the 25th ACM POPL , 1998
"... Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifier enforces static constraints that prevent various dynamic errors. Given the importance of the bytecode verifier for secu ..."
Abstract - Cited by 186 (0 self) - Add to MetaCart
trusted by the VM that receives it. Therefore, a bytecode verifier enforces static constraints on mobile JVML code. These constraints rule out type errors (such as dereferencing an integer), access control violations (such as accessing a private method from outside its class),

Do firms want to borrow more? Testing credit constraints using a directed lending program. Working Paper

by Abhijit V. Banerjee, Esther Duflo - MIT, Department of Economics , 2002
"... This paper uses variation in access to a targeted lending program to estimate whether firms are credit constrained. While both constrained and unconstrained firms may be willing to absorb all the directed credit that they can get (because it may be cheaper than other sources of credit), constrained ..."
Abstract - Cited by 111 (10 self) - Add to MetaCart
This paper uses variation in access to a targeted lending program to estimate whether firms are credit constrained. While both constrained and unconstrained firms may be willing to absorb all the directed credit that they can get (because it may be cheaper than other sources of credit), constrained

Making Views Self-Maintainable for Data Warehousing

by Dallan Quass, Ashish Gupta, Inderpal Singh Mumick, Jennifer Widom , 1996
"... A data warehouse stores materialized views over data from one or more sources in order to provide fast access to the integrated data, regardless of the availability of the data sources. Warehouse views need to be maintained in response to changes to the base data in the sources. Except for very simp ..."
Abstract - Cited by 131 (15 self) - Add to MetaCart
simple views, maintaining a warehouse view requires access to data that is not available in the view itself. Hence, to maintain the view, one either has to query the data sources or store auxiliary data in the warehouse. We show that by using key and referential integrity constraints, we often can

Private Transfers, Borrowing Constraints and the Timing of Homeownership

by Luigi Guiso, Tullio Jappelli, Luigi Guiso, Università Di Sassari, Ente Luigi Einaudi , 1999
"... The 1991 Italian Survey of Household Income and Wealth contains detailed information on how respondents acquired their main residence and any other real estate. This information is used to estimate the impact of inter vivos transfers on the saving period required to purchase a house and on the value ..."
Abstract - Cited by 52 (3 self) - Add to MetaCart
and on the value of the house purchased when households have limited access to mortgage markets. It is found that transfers shorten the saving time by about two years and allow households to purchase considerably larger homes. The results have implications for the debate about the source of the relation between
Next 10 →
Results 1 - 10 of 955
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University