By Topic

2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)

1-6 March 2010

Filter Results

Displaying Results 1 - 25 of 82
  • [Front inside cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (444 KB)
    Freely Available from IEEE
  • [Back inside cover]

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (481 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (581 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (949 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • List

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Brief author index

    Publication Year: 2010
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2010, Page(s):1 - 33
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (454 KB)
    Freely Available from IEEE
  • Message from the ICDE 2010 workshop chairs

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program book

    Publication Year: 2010, Page(s):1 - 122
    Request permission for commercial reuse | PDF file iconPDF (638 KB)
    Freely Available from IEEE
  • The 4th International Workshop on Ranking in Databases (DBRank'10)

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Subspace similarity search using the ideas of ranking and top-k retrieval

    Publication Year: 2010, Page(s):4 - 9
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    There are abundant scenarios for applications of similarity search in databases where the similarity of objects is defined for a subset of attributes, i.e., in a subspace, only. While much research has been done in efficient support of single column similarity queries or of similarity queries in the full space, scarcely any support of similarity search in subspaces has been provided so far. The th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient k-nearest neighbor queries with the Signature Quadratic Form Distance

    Publication Year: 2010, Page(s):10 - 15
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4098 KB) | HTML iconHTML

    A frequently encountered query type in multimedia databases is the k-nearest neighbor query which finds the k-nearest neighbors of a given query. To speed up such queries and to meet the user requirements in low response time, approximation techniques play an important role. In this paper, we present an efficient approximation technique applicable to distance measures defined over flexible feature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Top-k pipe join

    Publication Year: 2010, Page(s):16 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    In the context of service composition and orchestration, service invocation is typically scheduled according to execution plans, whose topology establishes whether different services are to be invoked in parallel or in a sequence. In the latter case, we may have a configuration, called pipe join, in which the output of a service is used as input for another service. When the services involved in a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On novelty in publish/subscribe delivery

    Publication Year: 2010, Page(s):20 - 22
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    In publish/subscribe systems, users express their interests in specific items of information and get notified when relevant data items are produced. Such systems allow users to stay informed without the need of going through huge amounts of data. However, as the volume of data being created increases, some form of ranking of matched events is needed to avoid overwhelming the users. In this work-in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ranking for data repairs

    Publication Year: 2010, Page(s):23 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (561 KB) | HTML iconHTML

    Improving data quality is a time-consuming, laborintensive and often domain specific operation. A recent principled approach for repairing dirty database is to use data quality rules in the form of database constraints to identify dirty tuples and then use the rules to derive data repairs. Most of existing data repair approaches focus on providing fully automated solutions, which could be risky to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 2nd International Workshop on Information & Software as Services (WISS'10)

    Publication Year: 2010, Page(s):29 - 32
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • End-to-end confidentiality for a message warehousing service using Identity-Based Encryption

    Publication Year: 2010, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (697 KB) | HTML iconHTML

    More and more classes of devices become capable of connecting to the Internet. Due to the observation that a point-to-point communication is insufficient for many non-interactive application integration scenarios we assume the existence of a logically centralized message warehousing service, which clients can use to deposit and retrieve messages. The particular challenge in this context is that a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The HiBench benchmark suite: Characterization of the MapReduce-based data analysis

    Publication Year: 2010, Page(s):41 - 51
    Cited by:  Papers (120)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    The MapReduce model is becoming prominent for the large-scale data analysis in the cloud. In this paper, we present the benchmarking, evaluation and characterization of Hadoop, an open-source implementation of MapReduce. We first introduce HiBench, a new benchmark suite for Hadoop. It consists of a set of Hadoop programs, including both synthetic micro-benchmarks and real-world Hadoop applications... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards enterprise software as a service in the cloud

    Publication Year: 2010, Page(s):52 - 59
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    For traditional data warehouses, mostly large and expensive server and storage systems are used. In particular, for small- and medium size companies, it is often too expensive to run or rent such systems. These companies might need analytical services only from time to time, for example at the end of a billing period. A solution to overcome these problems is to use Cloud Computing. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 5th International Workshop on Self-Managing Database Systems (SMDB'10)

    Publication Year: 2010, Page(s):60 - 62
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE