Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICDE
ICDE 2011
Generate Citations
2011 IEEE 27th International Conference on Data Engineering
April 11 2011 to April 16 2011
Hannover
Table of Contents
Papers
Hub page
Freely available from IEEE.
pp. 1
Papers
Session list
Freely available from IEEE.
pp. 1
Papers
[PDF Reader FAQ and support]
Freely available from IEEE.
pp. 1
Papers
[PDF Reader FAQ and support]
Freely available from IEEE.
pp. 1-5
Papers
Table of contents
Freely available from IEEE.
pp. 1-35
Papers
Program Committee
Freely available from IEEE.
pp. 1-6
Papers
Brief author index
Freely available from IEEE.
pp. 1-11
Papers
Detailed author index
Freely available from IEEE.
pp. 1-57
Papers
The end of indexes
Freely available from IEEE.
pp. 1
Papers
Message from the ICDE 2011 program chairs and general chairs
Freely available from IEEE.
pp. 1
Papers
ICDE 2011 committees
Freely available from IEEE.
pp. 1
Papers
Embarrassingly scalable database systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
by
Anastasia Ailamaki
Papers
Ontological queries: Rewriting and optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-13
by
Georg Gottlob
,
Giorgio Orsi
,
Andreas Pieris
Papers
Playing games with databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 14
by
Johannes Gehrke
Papers
Interactive itinerary planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-26
by
Senjuti Basu Roy
,
Gautam Das
,
Sihem Amer-Yahia
,
Cong Yu
Papers
CubeLSI: An effective and efficient method for searching resources in social tagging systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-38
by
Bin Bi
,
Sau Dan Lee
,
Ben Kao
,
Reynold Cheng
Papers
Adding regular expressions to graph reachability and pattern queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-50
by
Wenfei Fan
,
Jianzhong Li
,
Shuai Ma
,
Nan Tang
,
Yinghui Wu
Papers
Efficient core decomposition in massive networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-62
by
James Cheng
,
Yiping Ke
,
Shumo Chu
,
M. Tamer Ozsu
Papers
T-verifier: Verifying truthfulness of fact statements
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-74
by
Xian Li
,
Weiyi Meng
,
Clement Yu
Papers
Flexible use of cloud resources through profit maximization and price discrimination
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-86
by
Konstantinos Tsakalozos
,
Herald Kllapi
,
Eva Sitaridi
,
Mema Roussopoulos
,
Dimitris Paparas
,
Alex Delis
Papers
Intelligent management of virtualized resources for database systems in cloud environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-98
by
Pengcheng Xiong
,
Yun Chi
,
Shenghuo Zhu
,
Hyun Jin Moon
,
Calton Pu
,
Hakan Hacigumus
Papers
Extensibility and Data Sharing in evolving multi-tenant databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-110
by
Stefan Aulbach
,
Michael Seibold
,
Dean Jacobs
,
Alfons Kemper
Papers
High-performance nested CEP query processing over event streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-134
by
Mo Liu
,
Elke Rundensteiner
,
Dan Dougherty
,
Chetan Gupta
,
Song Wang
,
Ismail Ari
,
Abhay Mehta
Semantic stream query optimization exploiting dynamic metadata
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-122
by
Luping Ding
,
Karen Works
,
Elke A. Rundensteiner
Papers
Continuous monitoring of distance-based outliers over data streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-146
by
Maria Kontaki
,
Anastasios Gounaris
,
Apostolos N. Papadopoulos
,
Kostas Tsichlas
,
Yannis Manolopoulos
Papers
Algorithms for local sensor synchronization
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-158
by
Lixing Wang
,
Yin Yang
,
Xin Miao
,
Dimitris Papadias
,
Yunhao Liu
Papers
Semi-Streamed Index Join for near-real time execution of ETL transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-170
by
Mihaela A. Bornea
,
Antonios Deligiannakis
,
Yannis Kotidis
,
Vasilis Vassalos
Papers
Similarity measures for multidimensional data
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-182
by
Eftychia Baikousi
,
Georgios Rogkakos
,
Panos Vassiliadis
Papers
Distributed cube materialization on holistic measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-194
by
Arnab Nandi
,
Cong Yu
,
Philip Bohannon
,
Raghu Ramakrishnan
Papers
HyPer: A hybrid OLTP&OLAP main memory database system based on virtual memory snapshots
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-206
by
Alfons Kemper
,
Thomas Neumann
Papers
LTS: Discriminative subgraph mining by learning from search history
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-218
by
Ning Jin
,
Wei Wang
Papers
Active learning based frequent itemset mining over the deep web
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-230
by
Tantan Liu
,
Gagan Agrawal
Papers
SystemML: Declarative machine learning on MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-242
by
Amol Ghoting
,
Rajasekar Krishnamurthy
,
Edwin Pednault
,
Berthold Reinwald
,
Vikas Sindhwani
,
Shirish Tatikonda
,
Yuanyuan Tian
,
Shivakumar Vaithyanathan
Papers
Mining large graphs: Algorithms, inference, and discoveries
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-254
by
U Kang
,
Duen Horng Chau
,
Christos Faloutsos
Papers
Accurate latency estimation in a distributed event processing system
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-266
by
Badrish Chandramouli
,
Jonathan Goldstein
,
Roger Barga
,
Mirek Riedewald
,
Ivo Santos
Papers
Subscriber assignment for wide-area content-based publish/subscribe
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-278
by
Albert Yu
,
Pankaj K. Agarwal
,
Jun Yang
Papers
Collaborative caching for spatial queries in Mobile P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-290
by
Qijun Zhu
,
Dik Lun Lee
,
Wang-Chien Lee
Papers
ES2: A cloud data storage system for supporting both OLTP and OLAP
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-302
by
Yu Cao
,
Chun Chen
,
Fei Guo
,
Dawei Jiang
,
Yuting Lin
,
Beng Chin Ooi
,
Hoang Tam Vo
,
Sai Wu
,
Quanqing Xu
Papers
Deriving probabilistic databases with inference ensembles
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-314
by
Julia Stoyanovich
,
Susan Davidson
,
Tova Milo
,
Val Tannen
Papers
Providing support for full relational algebra in probabilistic databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-326
by
Robert Fink
,
Dan Olteanu
,
Swaroop Rath
Papers
Creating probabilistic databases from imprecise time-series data
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-338
by
Saket Sathe
,
Hoyoung Jeung
,
Karl Aberer
Papers
A novel probabilistic pruning approach to speed up similarity queries in uncertain databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-350
by
Thomas Bernecker
,
Tobias Emrich
,
Hans-Peter Kriegel
,
Nikos Mamoulis
,
Matthias Renz
,
Andreas Zufle
Papers
Interactive SQL query suggestion: Making databases user-friendly
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-362
by
Ju Fan
,
Guoliang Li
,
Lizhu Zhou
Papers
Computing structural statistics by keywords in databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-374
by
Lu Qin
,
Jeffrey Xu Yu
,
Lijun Chang
Papers
Program transformations for asynchronous query submission
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-386
by
Mahendra Chavan
,
Ravindra Guravannavar
,
Karthik Ramachandra
,
S. Sudarshan
Papers
Representative skylines using threshold-based preference distributions
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-398
by
Atish Das Sarma
,
Ashwin Lall
,
Danupon Nanongkai
,
Richard J. Lipton
,
Jim Xu
Papers
Outlier detection in graph streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-409
by
Charu C. Aggarwal
,
Yuchen Zhao
,
Philip S. Yu
Papers
Locality Sensitive Outlier Detection: A ranking driven approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-421
by
Ye Wang
,
Srinivasan Parthasarathy
,
Shirish Tatikonda
Papers
Outlier detection on uncertain data: Objects, instances, and inferences
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-433
by
Bin Jiang
,
Jian Pei
Papers
Statistical selection of relevant subspace projections for outlier ranking
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-445
by
Emmanuel Muller
,
Matthias Schiffer
,
Thomas Seidl
Papers
A unified model for data and constraint repair
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-457
by
Fei Chiang
,
Renee J. Miller
Papers
Fast-join: An efficient method for fuzzy token matching based string similarity join
Full-text access may be available. Sign in or learn about subscription options.
pp. 458-469
by
Jiannan Wang
,
Guoliang Li
,
Jianhua Fe
Papers
On data dependencies in dataspaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-481
by
Shaoxu Song
,
Lei Chen
,
Philip S. Yu
Papers
Precisely Serializable Snapshot Isolation (PSSI)
Full-text access may be available. Sign in or learn about subscription options.
pp. 482-493
by
Stephen Revilak
,
Patrick O'Neil
,
Elizabeth O'Neil
Papers
MobiMix: Protecting location privacy with mix-zones over road networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-505
by
Balaji Palanisamy
,
Ling Liu
Papers
General secure sensor aggregation in the presence of malicious nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-516
by
Keith B. Frikken
,
Kyle Kauffman
,
Aaron Steele
Papers
Secure and efficient in-network processing of exact SUM queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-528
by
Stavros Papadopoulos
,
Aggelos Kiayias
,
Dimitris Papadias
Papers
Preventing equivalence attacks in updated, anonymized data
Full-text access may be available. Sign in or learn about subscription options.
pp. 529-540
by
Yeye He
,
Siddharth Barman
,
Jeffrey F. Naughton
Papers
Efficient continuously moving top-k spatial keyword query processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-552
by
Dingming Wu
,
Man Lung Yiu
,
Christian S. Jensen
,
Gao Cong
Papers
Large scale Hamming distance query processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 553-564
by
Alex X. Liu
,
Ke Shen
,
Eric Torng
Papers
Authentication of moving kNN queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 565-576
by
Man Lung Yiu
,
Eric Lo
,
Duncan Yung
Papers
Influence zone: Efficiently processing reverse k nearest neighbors queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 577-588
by
Muhammad Aamir Cheema
,
Xuemin Lin
,
Wenjie Zhang
,
Ying Zhang
Papers
RAFTing MapReduce: Fast recovery on the RAFT
Full-text access may be available. Sign in or learn about subscription options.
pp. 589-600
by
Jorge-Arnulfo Quiane-Ruiz
,
Christoph Pinkel
,
Jorg Schad
,
Jens Dittrich
Papers
Processing private queries over untrusted data cloud through privacy homomorphism
Full-text access may be available. Sign in or learn about subscription options.
pp. 601-612
by
Haibo Hu
,
Jianliang Xu
,
Chushi Ren
,
Byron Choi
Papers
Real-time quantification and classification of consistency anomalies in multi-tier architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 613-624
by
Kamal Zellag
,
Bettina Kemme
Papers
One-copy serializability with snapshot isolation under the hood
Full-text access may be available. Sign in or learn about subscription options.
pp. 625-636
by
Mihaela A. Bornea
,
Orion Hodson
,
Sameh Elnikety
,
Alan Fekete
Papers
Efficient maintenance of common keys in archives of continuous query results from deep websites
Full-text access may be available. Sign in or learn about subscription options.
pp. 637-648
by
Fajar Ardian
,
Sourav S Bhowmick
Papers
How schema independent are schema free query interfaces?
Full-text access may be available. Sign in or learn about subscription options.
pp. 649-660
by
Arash Termehchy
,
Marianne Winslett
,
Yodsawalai Chodpathumwan
Papers
XClean: Providing valid spelling suggestions for XML keyword queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 661-672
by
Yifei Lu
,
Wei Wang
,
Jianxin Li
,
Chengfei Liu
Papers
Top-k keyword search over probabilistic XML data
Full-text access may be available. Sign in or learn about subscription options.
pp. 673-684
by
Jianxin Li
,
Chengfei Liu
,
Rui Zhou
,
Wei Wang
Papers
Selectivity estimation for extraction operators over text data
Full-text access may be available. Sign in or learn about subscription options.
pp. 685-696
by
Daisy Zhe Wang
,
Long Wei
,
Yunyao Li
,
Frederick Reiss
,
Shivakumar Vaithyanathan
Papers
Join queries on uncertain data: Semantics and efficient processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 697-708
by
Tingjian Ge
Papers
Interval-based pruning for top-k processing over compressed lists
Full-text access may be available. Sign in or learn about subscription options.
pp. 709-720
by
Kaushik Chakrabarti
,
Surajit Chaudhuri
,
Venkatesh Ganti
Papers
Stochastic skyline operator
Full-text access may be available. Sign in or learn about subscription options.
pp. 721-732
by
Xuemin Lin
,
Ying Zhang
,
Wenjie Zhang
,
Muhammad Aamir Cheema
Papers
Discovery of complex glitch patterns: A novel approach to Quantitative Data Cleaning
Full-text access may be available. Sign in or learn about subscription options.
pp. 733-744
by
Laure Berti-Equille
,
Tamraparni Dasu
,
Divesh Srivastava
Papers
Towards exploratory hypothesis testing and analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 745-756
by
Guimei Liu
,
Mengling Feng
,
Yue Wang
,
Limsoon Wong
,
See-Kiong Ng
,
Tzia Liang Mah
,
Edmund Jon Deoon Lee
Papers
SMM: A data stream management system for knowledge discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 757-768
by
Hetal Thakkar
,
Nikolay Laptev
,
Hamid Mousavi
,
Barzan Mozafari
,
Vincenzo Russo
,
Carlo Zaniolo
Papers
Knowledge transfer with low-quality data: A feature extraction issue
Full-text access may be available. Sign in or learn about subscription options.
pp. 769-779
by
Brian Quanz
,
Jun Huan
,
Meenakshi Mishra
Papers
EdiFlow: Data-intensive interactive workflows for visual analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 780-791
by
Veronique Benzaken
,
Jean-Daniel Fekete
,
Pierre-Luc Hemery
,
Wael Khemiri
,
Ioana Manolescu
Papers
A continuous query system for dynamic route planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 792-803
by
Nirmesh Malviya
,
Samuel Madden
,
Arnab Bhattacharya
Papers
Optimal location queries in road network databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 804-815
by
Xiaokui Xiao
,
Bin Yao
,
Feifei Li
Papers
Spatio-temporal joins on symbolic indoor tracking data
Full-text access may be available. Sign in or learn about subscription options.
pp. 816-827
by
Hua Lu
,
Bin Yang
,
Christian S. Jensen
Papers
MaxFirst for MaxBRkNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 828-839
by
Zenan Zhou
,
Wei Wu
,
Xiaohui Li
,
Mong Li Lee
,
Wynne Hsu
Papers
SQPR: Stream query planning with reuse
Full-text access may be available. Sign in or learn about subscription options.
pp. 840-851
by
Evangelia Kalyvianaki
,
Wolfram Wiesemann
,
Quang Hieu Vu
,
Daniel Kuhn
,
Peter Pietzuch
Papers
Memory-constrained aggregate computation over data streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 852-863
by
K.V.M. Naidu
,
Rajeev Rastogi
,
Scott Satkin
,
Anand Srinivasan
Papers
A new, highly efficient, and easy to implement top-down join enumeration algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 864-875
by
Pit Fender
,
Guido Moerkotte
Papers
Transactional In-Page Logging for multiversion read consistency and recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 876-887
by
Sang-Won Lee
,
Bongki Moon
Papers
Answering approximate string queries on large data sets using external memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 888-899
by
Alexander Behm
,
Chen Li
,
Michael J. Carey
Papers
Discovering popular routes from trajectories
Full-text access may be available. Sign in or learn about subscription options.
pp. 900-911
by
Zaiben Chen
,
Heng Tao Shen
,
Xiaofang Zhou
Papers
Identity obfuscation in graphs through the information theoretic lens
Full-text access may be available. Sign in or learn about subscription options.
pp. 924-935
by
Francesco Bonchi
,
Aristides Gionis
,
Tamir Tassa
Spectrum based fraud detection in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 912-923
by
Xiaowei Ying
,
Xintao Wu
,
Daniel Barbará
Papers
Monte Carlo query processing of uncertain multidimensional array data
Full-text access may be available. Sign in or learn about subscription options.
pp. 936-947
by
Tingjian Ge
,
David Grabiner
,
Stan Zdonik
Papers
Massively parallel XML twig filtering using dynamic programming on FPGAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 948-959
by
Roger Moussalli
,
Mariam Salloum
,
Walid Najjar
,
Vassilis J. Tsotras
Papers
Selectivity estimation of twig queries on cyclic graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 960-971
by
Yun Peng
,
Byron Choi
,
Jianliang Xu
Papers
Efficient XQuery rewriting using multiple views
Full-text access may be available. Sign in or learn about subscription options.
pp. 972-983
by
Ioana Manolescu
,
Konstantinos Karanasos
,
Vasilis Vassalos
,
Spyros Zoupanos
Papers
Characteristic sets: Accurate cardinality estimation for RDF queries with multiple joins
Full-text access may be available. Sign in or learn about subscription options.
pp. 984-994
by
Thomas Neumann
,
Guido Moerkotte
Papers
PrefJoin: An efficient preference-aware join operator
Full-text access may be available. Sign in or learn about subscription options.
pp. 995-1006
by
Mohamed E. Khalefa
,
Mohamed F. Mokbel
,
Justin J. Levandoski
Papers
Decomposing DAGs into spanning trees: A new way to compress transitive closures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1007-1018
by
Yangjun Chen
,
Yibin Chen
Papers
Preference queries over sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1019-1030
by
Xi Zhang
,
Jan Chomicki
Papers
A unified approach for computing top-k pairs in multidimensional space
Full-text access may be available. Sign in or learn about subscription options.
pp. 1031-1042
by
Muhammad Aamir Cheema
,
Xuemin Lin
,
Haixun Wang
,
Jianmin Wang
,
Wenjie Zhang
Showing 100 out of 150
Load More
Load All