Results 1 - 10
of
955
Evaluating Top-k Queries over Web-Accessible Databases
- ACM TRANS. ON DATABASE SYSTEMS
, 2004
"... ... In this article, we study how to process top-k queries efficiently in this setting, where the attributes for which users specify target values might be handled by external, autonomous sources with a variety of access interfaces. We present a sequential algorithm for processing such queries, but ..."
Abstract
-
Cited by 253 (15 self)
- Add to MetaCart
may impose some restrictions on the type and number of probes that they are willing to accept. We adapt our sequential query processing technique and introduce an efficient algorithm that maximizes sourceaccess parallelism to minimize query response time, while satisfying source-access constraints.
Reconciling Schemas of Disparate Data Sources: A Machine-Learning Approach
- In SIGMOD Conference
, 2001
"... A data-integration system provides access to a multitude of data sources through a single mediated schema. A key bottleneck in building such systems has been the laborious manual construction of semantic mappings between the source schemas and the mediated schema. We describe LSD, a system that empl ..."
Abstract
-
Cited by 424 (50 self)
- Add to MetaCart
A data-integration system provides access to a multitude of data sources through a single mediated schema. A key bottleneck in building such systems has been the laborious manual construction of semantic mappings between the source schemas and the mediated schema. We describe LSD, a system
System Description: Twelf --- A Meta-Logical Framework for Deductive Systems
- Proceedings of the 16th International Conference on Automated Deduction (CADE-16
, 1999
"... . Twelf is a meta-logical framework for the specification, implementation, and meta-theory of deductive systems from the theory of programming languages and logics. It relies on the LF type theory and the judgments-as-types methodology for specification [HHP93], a constraint logic programming interp ..."
Abstract
-
Cited by 357 (54 self)
- Add to MetaCart
platforms. The current version (1.2) is distributed with a complete manual, example suites, a tutorial in the form of on-line lecture notes [Pfe], and an Emacs interface. Source and binary distributions are accessible via the Twelf home page http://www.cs.cmu.edu/~twelf. 1 The Twelf System The Twelf
Parallel Probing of Web Databases for Top-k Query Processing
"... A “top-k query” specifies a set of preferred values for the attributes of a relation and expects as a result the k objects that are “closest” to the given preferences according to some distance function. In many web applications, the relation attributes are only available via probes to autonomous we ..."
Abstract
- Add to MetaCart
on the type and number of probes that they are willing to accept. These characteristics of web sources motivate the introduction of parallel top-k query processing strategies, which are the focus of this paper. We present efficient techniques that maximize source-access parallelism to minimize query response
Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints
"... Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giving users the ability to install third-party applications poses serious security concerns. While the existing security me ..."
Abstract
-
Cited by 154 (2 self)
- Add to MetaCart
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giving users the ability to install third-party applications poses serious security concerns. While the existing security
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
, 2002
"... In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. Socalled Data Grids seek to harness geographically distributed resources for such large-scale data-intensive problems. Yet ..."
Abstract
-
Cited by 190 (9 self)
- Add to MetaCart
effective scheduling in such environments is challenging, due to a need to address a variety of metrics and constraints (e.g., resource utilization, response time, global and local allocation policies) while dealing with multiple, potentially independent sources of jobs and a large number of storage
A type system for Java bytecode subroutines
- In Proceedings of the 25th ACM POPL
, 1998
"... Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifier enforces static constraints that prevent various dynamic errors. Given the importance of the bytecode verifier for secu ..."
Abstract
-
Cited by 186 (0 self)
- Add to MetaCart
trusted by the VM that receives it. Therefore, a bytecode verifier enforces static constraints on mobile JVML code. These constraints rule out type errors (such as dereferencing an integer), access control violations (such as accessing a private method from outside its class),
Do firms want to borrow more? Testing credit constraints using a directed lending program. Working Paper
- MIT, Department of Economics
, 2002
"... This paper uses variation in access to a targeted lending program to estimate whether firms are credit constrained. While both constrained and unconstrained firms may be willing to absorb all the directed credit that they can get (because it may be cheaper than other sources of credit), constrained ..."
Abstract
-
Cited by 111 (10 self)
- Add to MetaCart
This paper uses variation in access to a targeted lending program to estimate whether firms are credit constrained. While both constrained and unconstrained firms may be willing to absorb all the directed credit that they can get (because it may be cheaper than other sources of credit), constrained
Making Views Self-Maintainable for Data Warehousing
, 1996
"... A data warehouse stores materialized views over data from one or more sources in order to provide fast access to the integrated data, regardless of the availability of the data sources. Warehouse views need to be maintained in response to changes to the base data in the sources. Except for very simp ..."
Abstract
-
Cited by 131 (15 self)
- Add to MetaCart
simple views, maintaining a warehouse view requires access to data that is not available in the view itself. Hence, to maintain the view, one either has to query the data sources or store auxiliary data in the warehouse. We show that by using key and referential integrity constraints, we often can
Private Transfers, Borrowing Constraints and the Timing of Homeownership
, 1999
"... The 1991 Italian Survey of Household Income and Wealth contains detailed information on how respondents acquired their main residence and any other real estate. This information is used to estimate the impact of inter vivos transfers on the saving period required to purchase a house and on the value ..."
Abstract
-
Cited by 52 (3 self)
- Add to MetaCart
and on the value of the house purchased when households have limited access to mortgage markets. It is found that transfers shorten the saving time by about two years and allow households to purchase considerably larger homes. The results have implications for the debate about the source of the relation between
Results 1 - 10
of
955