• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 873
Next 10 →

Summary cache: A scalable wide-area web cache sharing protocol

by Li Fan, Pei Cao, Jussara Almeida, Andrei Z. Broder , 1998
"... The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols. In this paper we propose a new protocol called "Summary Cache"; each proxy keeps a su ..."
Abstract - Cited by 894 (3 self) - Add to MetaCart
summary of the URLs of cached documents of each participating proxy and checks these summaries for potential hits before sending any queries. Two factors contribute to the low overhead: the summaries are updated only periodically, and the summary representations are economical -- as low as 8 bits per

Fjording the Stream: An Architecture for Queries over Streaming Sensor Data

by Samuel Madden , Michael J. Franklin , 2002
"... If industry visionaries are correct, our lives will soon be full of sensors, connected together in loose conglomerations via wireless networks, each monitoring and collecting data about the environment at large. These sensors behave very differently from traditional database sources: they have inter ..."
Abstract - Cited by 281 (8 self) - Add to MetaCart
multiple queries over many sensors, and show how it can be used to limit sensor resource demands while maintaining high query throughput. We evaluate our architecture using traces from a network of traffic sensors deployed on Interstate 80 near Berkeley and present performance results that show how query

Analysis of Geographic Queries in a Search Engine Log

by Qingqing Gan, Josh Attenberg, Alexander Markowetz, Torsten Suel , 2008
"... Geography is becoming increasingly important in web search. Search engines can often return better results to users by analyzing features such as user location or geographic terms in web pages and user queries. This is also of great commercial value as it enables location specific advertising and im ..."
Abstract - Cited by 30 (0 self) - Add to MetaCart
in an attempt to restrict results to a particular region or location. Our main motivation is to identify opportunities for improving geographical search and related technologies, and we perform an analysis of 36 million queries of the recently released AOL query trace. First, we identify typical properties

Tracing the Lineage of View Data in a Warehousing Environment

by Yingwei Cui, Jennifer Widom, Janet L. Wiener - ACM Transactions on Database Systems , 1997
"... We consider the view data lineage problem in a warehousing environment: For a given data item in a materialized warehouse view, we want to identify the set of source data items that produced the view item. We formally define the lineage problem, develop lineage tracing algorithms for relational v ..."
Abstract - Cited by 176 (14 self) - Add to MetaCart
We consider the view data lineage problem in a warehousing environment: For a given data item in a materialized warehouse view, we want to identify the set of source data items that produced the view item. We formally define the lineage problem, develop lineage tracing algorithms for relational

Stratified Analysis of AOL Query Log

by David J. Brenes, Daniel Gayo-Avello - INFORMATION SCIENCES VOLUME 179 , 2009
"... ..."
Abstract - Add to MetaCart
Abstract not found

Relational Queries Over Program Traces

by Simon Goldsmith, et al. , 2005
"... Instrumenting programs with code to monitor runtime behavior is a common technique for profiling and debugging. In practice, instrumentation is either inserted manually by programmers, or automatically by specialized tools that monitor particular properties. We propose Program Trace Query Language ( ..."
Abstract - Cited by 76 (2 self) - Add to MetaCart
Instrumenting programs with code to monitor runtime behavior is a common technique for profiling and debugging. In practice, instrumentation is either inserted manually by programmers, or automatically by specialized tools that monitor particular properties. We propose Program Trace Query Language

Query Evaluation and Progression in AOL Knowledge Bases

by Gerhard Lakemeyer, Hector J. Levesque - Proceedings of the International Joint Conference on Arti Intelligence (IJCAI , 1999
"... Recently Lakemeyer and Levesque proposed the logic AOL, which amalgamates both the situation calculus and Levesque's logic of only knowing. ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
Recently Lakemeyer and Levesque proposed the logic AOL, which amalgamates both the situation calculus and Levesque's logic of only knowing.

The Cascades Framework for Query Optimization

by Goetz Graefe - Data Engineering Bulletin , 1995
"... This paper describes a new extensible query optimization framework that resolves many of the shortcomings of the EXODUS and Volcano optimizer generators. In addition to extensibility, dynamic programming, and memorization based on and extended from the EXODUS and Volcano prototypes, this new optimiz ..."
Abstract - Cited by 107 (2 self) - Add to MetaCart
This paper describes a new extensible query optimization framework that resolves many of the shortcomings of the EXODUS and Volcano optimizer generators. In addition to extensibility, dynamic programming, and memorization based on and extended from the EXODUS and Volcano prototypes, this new

CryptDB: Protecting confidentiality with encrypted query processing

by Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan - In SOSP , 2011
"... Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. CryptDB is a system that provides practical and provable confidentiality in th ..."
Abstract - Cited by 124 (8 self) - Add to MetaCart
of one of the users with access to that data. As a result, a database administrator never gets access to decrypted data, and even if all servers are compromised, an adversary cannot decrypt the data of any user who is not logged in. An analysis of a trace of 126 million SQL queries from a production My

The Effectiveness of GlOSS for the Text Database Discovery Problem

by Luis Gravano, Hector Garcia-Molina, Anthony Tomasic , 1994
"... The popularity of on-line document databases has led to a new problem: finding which text databases (out of many candidate choices) are the most relevant to a user. Identifying the relevant databases for a given query is the text database discovery problem. The first part of this paper presents a pr ..."
Abstract - Cited by 159 (25 self) - Add to MetaCart
practical solution based on estimating the result size of a query and a database. The method is termed GlOSS-Glossary of Servers Server. The second part of this paper evaluates the effectiveness of GlOSS based on a trace of real user queries. In addition, we analyze the storage cost of our approach.
Next 10 →
Results 1 - 10 of 873
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University