Default Cover Image

2011 IEEE 27th International Conference on Data Engineering

April 11 2011 to April 16 2011

Hannover

Table of Contents

Papers
Hub pageFreely available from IEEE.pp. 1
Papers
Session listFreely available from IEEE.pp. 1
Papers
[PDF Reader FAQ and support]Freely available from IEEE.pp. 1
Papers
[PDF Reader FAQ and support]Freely available from IEEE.pp. 1-5
Papers
Table of contentsFreely available from IEEE.pp. 1-35
Papers
Program CommitteeFreely available from IEEE.pp. 1-6
Papers
Brief author indexFreely available from IEEE.pp. 1-11
Papers
Detailed author indexFreely available from IEEE.pp. 1-57
Papers
The end of indexesFreely available from IEEE.pp. 1
Papers
Message from the ICDE 2011 program chairs and general chairsFreely available from IEEE.pp. 1
Papers
ICDE 2011 committeesFreely available from IEEE.pp. 1
Papers
Embarrassingly scalable database systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Ontological queries: Rewriting and optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 2-13
Papers
Playing games with databasesFull-text access may be available. Sign in or learn about subscription options.pp. 14
Papers
Interactive itinerary planningFull-text access may be available. Sign in or learn about subscription options.pp. 15-26
Papers
CubeLSI: An effective and efficient method for searching resources in social tagging systemsFull-text access may be available. Sign in or learn about subscription options.pp. 27-38
Papers
Adding regular expressions to graph reachability and pattern queriesFull-text access may be available. Sign in or learn about subscription options.pp. 39-50
Papers
Efficient core decomposition in massive networksFull-text access may be available. Sign in or learn about subscription options.pp. 51-62
Papers
T-verifier: Verifying truthfulness of fact statementsFull-text access may be available. Sign in or learn about subscription options.pp. 63-74
Papers
Intelligent management of virtualized resources for database systems in cloud environmentFull-text access may be available. Sign in or learn about subscription options.pp. 87-98
Papers
Extensibility and Data Sharing in evolving multi-tenant databasesFull-text access may be available. Sign in or learn about subscription options.pp. 99-110
Papers
High-performance nested CEP query processing over event streamsFull-text access may be available. Sign in or learn about subscription options.pp. 123-134
Semantic stream query optimization exploiting dynamic metadataFull-text access may be available. Sign in or learn about subscription options.pp. 111-122
Papers
Continuous monitoring of distance-based outliers over data streamsFull-text access may be available. Sign in or learn about subscription options.pp. 135-146
Papers
Algorithms for local sensor synchronizationFull-text access may be available. Sign in or learn about subscription options.pp. 147-158
Papers
Semi-Streamed Index Join for near-real time execution of ETL transformationsFull-text access may be available. Sign in or learn about subscription options.pp. 159-170
Papers
Similarity measures for multidimensional dataFull-text access may be available. Sign in or learn about subscription options.pp. 171-182
Papers
Distributed cube materialization on holistic measuresFull-text access may be available. Sign in or learn about subscription options.pp. 183-194
Papers
HyPer: A hybrid OLTP&OLAP main memory database system based on virtual memory snapshotsFull-text access may be available. Sign in or learn about subscription options.pp. 195-206
Papers
LTS: Discriminative subgraph mining by learning from search historyFull-text access may be available. Sign in or learn about subscription options.pp. 207-218
Papers
Active learning based frequent itemset mining over the deep webFull-text access may be available. Sign in or learn about subscription options.pp. 219-230
Papers
Mining large graphs: Algorithms, inference, and discoveriesFull-text access may be available. Sign in or learn about subscription options.pp. 243-254
Papers
Accurate latency estimation in a distributed event processing systemFull-text access may be available. Sign in or learn about subscription options.pp. 255-266
Papers
Subscriber assignment for wide-area content-based publish/subscribeFull-text access may be available. Sign in or learn about subscription options.pp. 267-278
Papers
Collaborative caching for spatial queries in Mobile P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 279-290
Papers
ES2: A cloud data storage system for supporting both OLTP and OLAPFull-text access may be available. Sign in or learn about subscription options.pp. 291-302
Papers
Deriving probabilistic databases with inference ensemblesFull-text access may be available. Sign in or learn about subscription options.pp. 303-314
Papers
Providing support for full relational algebra in probabilistic databasesFull-text access may be available. Sign in or learn about subscription options.pp. 315-326
Papers
Creating probabilistic databases from imprecise time-series dataFull-text access may be available. Sign in or learn about subscription options.pp. 327-338
Papers
Interactive SQL query suggestion: Making databases user-friendlyFull-text access may be available. Sign in or learn about subscription options.pp. 351-362
Papers
Computing structural statistics by keywords in databasesFull-text access may be available. Sign in or learn about subscription options.pp. 363-374
Papers
Program transformations for asynchronous query submissionFull-text access may be available. Sign in or learn about subscription options.pp. 375-386
Papers
Representative skylines using threshold-based preference distributionsFull-text access may be available. Sign in or learn about subscription options.pp. 387-398
Papers
Outlier detection in graph streamsFull-text access may be available. Sign in or learn about subscription options.pp. 399-409
Papers
Locality Sensitive Outlier Detection: A ranking driven approachFull-text access may be available. Sign in or learn about subscription options.pp. 410-421
Papers
Outlier detection on uncertain data: Objects, instances, and inferencesFull-text access may be available. Sign in or learn about subscription options.pp. 422-433
Papers
Statistical selection of relevant subspace projections for outlier rankingFull-text access may be available. Sign in or learn about subscription options.pp. 434-445
Papers
A unified model for data and constraint repairFull-text access may be available. Sign in or learn about subscription options.pp. 446-457
Papers
Fast-join: An efficient method for fuzzy token matching based string similarity joinFull-text access may be available. Sign in or learn about subscription options.pp. 458-469
Papers
On data dependencies in dataspacesFull-text access may be available. Sign in or learn about subscription options.pp. 470-481
Papers
Precisely Serializable Snapshot Isolation (PSSI)Full-text access may be available. Sign in or learn about subscription options.pp. 482-493
Papers
MobiMix: Protecting location privacy with mix-zones over road networksFull-text access may be available. Sign in or learn about subscription options.pp. 494-505
Papers
General secure sensor aggregation in the presence of malicious nodesFull-text access may be available. Sign in or learn about subscription options.pp. 506-516
Papers
Secure and efficient in-network processing of exact SUM queriesFull-text access may be available. Sign in or learn about subscription options.pp. 517-528
Papers
Preventing equivalence attacks in updated, anonymized dataFull-text access may be available. Sign in or learn about subscription options.pp. 529-540
Papers
Efficient continuously moving top-k spatial keyword query processingFull-text access may be available. Sign in or learn about subscription options.pp. 541-552
Papers
Large scale Hamming distance query processingFull-text access may be available. Sign in or learn about subscription options.pp. 553-564
Papers
Authentication of moving kNN queriesFull-text access may be available. Sign in or learn about subscription options.pp. 565-576
Papers
Influence zone: Efficiently processing reverse k nearest neighbors queriesFull-text access may be available. Sign in or learn about subscription options.pp. 577-588
Papers
RAFTing MapReduce: Fast recovery on the RAFTFull-text access may be available. Sign in or learn about subscription options.pp. 589-600
Papers
Processing private queries over untrusted data cloud through privacy homomorphismFull-text access may be available. Sign in or learn about subscription options.pp. 601-612
Papers
Real-time quantification and classification of consistency anomalies in multi-tier architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 613-624
Papers
One-copy serializability with snapshot isolation under the hoodFull-text access may be available. Sign in or learn about subscription options.pp. 625-636
Papers
Efficient maintenance of common keys in archives of continuous query results from deep websitesFull-text access may be available. Sign in or learn about subscription options.pp. 637-648
Papers
How schema independent are schema free query interfaces?Full-text access may be available. Sign in or learn about subscription options.pp. 649-660
Papers
XClean: Providing valid spelling suggestions for XML keyword queriesFull-text access may be available. Sign in or learn about subscription options.pp. 661-672
Papers
Top-k keyword search over probabilistic XML dataFull-text access may be available. Sign in or learn about subscription options.pp. 673-684
Papers
Selectivity estimation for extraction operators over text dataFull-text access may be available. Sign in or learn about subscription options.pp. 685-696
Papers
Join queries on uncertain data: Semantics and efficient processingFull-text access may be available. Sign in or learn about subscription options.pp. 697-708
Papers
Interval-based pruning for top-k processing over compressed listsFull-text access may be available. Sign in or learn about subscription options.pp. 709-720
Papers
Stochastic skyline operatorFull-text access may be available. Sign in or learn about subscription options.pp. 721-732
Papers
Discovery of complex glitch patterns: A novel approach to Quantitative Data CleaningFull-text access may be available. Sign in or learn about subscription options.pp. 733-744
Papers
Towards exploratory hypothesis testing and analysisFull-text access may be available. Sign in or learn about subscription options.pp. 745-756
Papers
SMM: A data stream management system for knowledge discoveryFull-text access may be available. Sign in or learn about subscription options.pp. 757-768
Papers
Knowledge transfer with low-quality data: A feature extraction issueFull-text access may be available. Sign in or learn about subscription options.pp. 769-779
Papers
EdiFlow: Data-intensive interactive workflows for visual analyticsFull-text access may be available. Sign in or learn about subscription options.pp. 780-791
Papers
A continuous query system for dynamic route planningFull-text access may be available. Sign in or learn about subscription options.pp. 792-803
Papers
Optimal location queries in road network databasesFull-text access may be available. Sign in or learn about subscription options.pp. 804-815
Papers
Spatio-temporal joins on symbolic indoor tracking dataFull-text access may be available. Sign in or learn about subscription options.pp. 816-827
Papers
MaxFirst for MaxBRkNNFull-text access may be available. Sign in or learn about subscription options.pp. 828-839
Papers
SQPR: Stream query planning with reuseFull-text access may be available. Sign in or learn about subscription options.pp. 840-851
Papers
Memory-constrained aggregate computation over data streamsFull-text access may be available. Sign in or learn about subscription options.pp. 852-863
Papers
A new, highly efficient, and easy to implement top-down join enumeration algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 864-875
Papers
Transactional In-Page Logging for multiversion read consistency and recoveryFull-text access may be available. Sign in or learn about subscription options.pp. 876-887
Papers
Answering approximate string queries on large data sets using external memoryFull-text access may be available. Sign in or learn about subscription options.pp. 888-899
Papers
Discovering popular routes from trajectoriesFull-text access may be available. Sign in or learn about subscription options.pp. 900-911
Papers
Identity obfuscation in graphs through the information theoretic lensFull-text access may be available. Sign in or learn about subscription options.pp. 924-935
Spectrum based fraud detection in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 912-923
Papers
Monte Carlo query processing of uncertain multidimensional array dataFull-text access may be available. Sign in or learn about subscription options.pp. 936-947
Papers
Massively parallel XML twig filtering using dynamic programming on FPGAsFull-text access may be available. Sign in or learn about subscription options.pp. 948-959
Papers
Selectivity estimation of twig queries on cyclic graphsFull-text access may be available. Sign in or learn about subscription options.pp. 960-971
Papers
Efficient XQuery rewriting using multiple viewsFull-text access may be available. Sign in or learn about subscription options.pp. 972-983
Papers
Characteristic sets: Accurate cardinality estimation for RDF queries with multiple joinsFull-text access may be available. Sign in or learn about subscription options.pp. 984-994
Papers
PrefJoin: An efficient preference-aware join operatorFull-text access may be available. Sign in or learn about subscription options.pp. 995-1006
Papers
Decomposing DAGs into spanning trees: A new way to compress transitive closuresFull-text access may be available. Sign in or learn about subscription options.pp. 1007-1018
Papers
Preference queries over setsFull-text access may be available. Sign in or learn about subscription options.pp. 1019-1030
Papers
A unified approach for computing top-k pairs in multidimensional spaceFull-text access may be available. Sign in or learn about subscription options.pp. 1031-1042
Showing 100 out of 150