By Topic

2011 IEEE 27th International Conference on Data Engineering

Date 11-16 April 2011

Filter Results

Displaying Results 1 - 25 of 152
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1248 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Session list

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):1 - 35
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Brief author index

    Publication Year: 2011, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2011, Page(s):1 - 57
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (455 KB)
    Freely Available from IEEE
  • Message from the ICDE 2011 program chairs and general chairs

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICDE 2011 Committees

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Embarrassingly scalable database systems

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    Summary form only given. Database systems have long optimized for parallel execution; the research community has pursued parallel database machines since the early '80s, and several key ideas from that era underlie the design and success of commercial database engines today. Computer microarchitecture, however, has shifted drastically during the intervening decades. Until the end of the 20th centu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontological queries: Rewriting and optimization

    Publication Year: 2011, Page(s):2 - 13
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Ontological queries are evaluated against an enterprise ontology rather than directly on a database. The evaluation and optimization of such queries is an intriguing new problem for database research. In this paper we discuss two important aspects of this problem: query rewriting and query optimization. Query rewriting consists of the compilation of an ontological query into an equivalent query ag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Playing games with databases

    Publication Year: 2011, Page(s): 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB) | HTML iconHTML

    Scalability is a fundamental problem in the development of computer games and massively multiplayer online games (MMOs). Players always demand more - more polygons, more physics particles, more interesting AI behavior, more monsters, more simultaneous players and interactions, and larger virtual worlds. Scalability has long been a focus of the database research community. However, the games commun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive itinerary planning

    Publication Year: 2011, Page(s):15 - 26
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (937 KB) | HTML iconHTML

    Planning an itinerary when traveling to a city involves substantial effort in choosing Points-of-Interest (POIs), deciding in which order to visit them, and accounting for the time it takes to visit each POI and transit between them. Several online services address different aspects of itinerary planning but none of them provides an interactive interface where users give feedbacks and iteratively ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CubeLSI: An effective and efficient method for searching resources in social tagging systems

    Publication Year: 2011, Page(s):27 - 38
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    In a social tagging system, resources (such as photos, video and web pages) are associated with tags. These tags allow the resources to be effectively searched through tag-based keyword matching using traditional IR techniques. We note that in many such systems, tags of a resource are often assigned by a diverse audience of causal users (taggers). This leads to two issues that gravely affect the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adding regular expressions to graph reachability and pattern queries

    Publication Year: 2011, Page(s):39 - 50
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    It is increasingly common to find graphs in which edges bear different types, indicating a variety of relationships. For such graphs we propose a class of reachability queries and a class of graph patterns, in which an edge is specified with a regular expression of a certain form, expressing the connectivity in a data graph via edges of various types. In addition, we define graph pattern matching ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient core decomposition in massive networks

    Publication Year: 2011, Page(s):51 - 62
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    The k-core of a graph is the largest subgraph in which every vertex is connected to at least k other vertices within the subgraph. Core decomposition finds the k-core of the graph for every possible k. Past studies have shown important applications of core decomposition such as in the study of the properties of large networks (e.g., sustainability, connectivity, centrality, etc.), for solving NP-h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • T-verifier: Verifying truthfulness of fact statements

    Publication Year: 2011, Page(s):63 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    The Web has become the most popular place for people to acquire information. Unfortunately, it is widely recognized that the Web contains a significant amount of untruthful information. As a result, good tools are needed to help Web users determine the truthfulness of certain information. In this paper, we propose a two-step method that aims to determine whether a given statement is truthful, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible use of cloud resources through profit maximization and price discrimination

    Publication Year: 2011, Page(s):75 - 86
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Modern frameworks, such as Hadoop, combined with abundance of computing resources from the cloud, offer a significant opportunity to address long standing challenges in distributed processing. Infrastructure-as-a-Service clouds reduce the investment cost of renting a large data center while distributed processing frameworks are capable of efficiently harvesting the rented physical resources. Yet, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent management of virtualized resources for database systems in cloud environment

    Publication Year: 2011, Page(s):87 - 98
    Cited by:  Papers (26)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1078 KB) | HTML iconHTML

    In a cloud computing environment, resources are shared among different clients. Intelligently managing and allocating resources among various clients is important for system providers, whose business model relies on managing the infrastructure resources in a cost-effective manner while satisfying the client service level agreements (SLAs). In this paper, we address the issue of how to intelligentl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extensibility and Data Sharing in evolving multi-tenant databases

    Publication Year: 2011, Page(s):99 - 110
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (834 KB) | HTML iconHTML

    Software-as-a-Service applications commonly consolidate multiple businesses into the same database to reduce costs. This practice makes it harder to implement several essential features of enterprise applications. The first is support for master data, which should be shared rather than replicated for each tenant. The second is application modification and extension, which applies both to the datab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic stream query optimization exploiting dynamic metadata

    Publication Year: 2011, Page(s):111 - 122
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    Data stream management systems (DSMS) processing long-running queries over large volumes of stream data must typically deliver time-critical responses. We propose the first semantic query optimization (SQO) approach that utilizes dynamic substream metadata at runtime to find a more efficient query plan than the one selected at compilation time. We identify four SQO techniques guaranteed to result ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.