SIGMOD Officers , Committees , and Awardees Chair Vice-Chair Secretary /

In a co-space environment, the physical space and the virtual space co-exist, and interact simultaneously. While the physical space is virtually enhanced with information, the virtual space is continuously refreshed with real-time, real-world information. To allow users to process and manipulate information seamlessly between the real and digital spaces, novel technologies must be developed. These include smart interfaces, new augmented realities, efficient storage and data management and dissemination techniques. In this paper, we first discuss some promising co-space applications. These applications offer experiences and opportunities that neither of the spaces can realize on its own. We then argue that the database community has much to offer to this field. Finally, we present several challenges that we, as a community, can contribute towards managing the co-space.

[1]  Srinivas Devadas,et al.  DIRECTORYLESS SHARED MEMORY COHERENCE USING EXECUTION MIGRATION , 2011 .

[2]  David P. Woodruff,et al.  Optimal Random Sampling from Distributed Streams Revisited , 2011, DISC.

[3]  Michael Stonebraker,et al.  The Architecture of SciDB , 2011, SSDBM.

[4]  Ganesh Ramakrishnan,et al.  Efficient Rule Ensemble Learning using Hierarchical Kernels , 2011, ICML.

[5]  Magdalena Balazinska,et al.  ArrayStore: a storage manager for complex parallel array processing , 2011, SIGMOD '11.

[6]  Graham Cormode,et al.  Tracking distributed aggregates over time-based sliding windows , 2011, PODC '11.

[7]  Sören Auer,et al.  The emerging web of linked data , 2011, ISWSA '11.

[8]  S. Sudarshan,et al.  DBridge: A program rewrite tool for set-oriented query execution , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[9]  S. Sudarshan,et al.  Program transformations for asynchronous query submission , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[10]  S. Sudarshan,et al.  Generating test data for killing SQL mutants: A constraint-based approach , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[11]  Barry Bishop,et al.  FactForge: A fast track to the Web of data , 2011, Semantic Web.

[12]  Ganesh Ramakrishnan,et al.  Web-scale entity-relation search architecture , 2011, WWW.

[13]  Rahul Gupta,et al.  Joint training for open-domain extraction on the web: exploiting overlap when supervision is limited , 2011, WSDM '11.

[14]  Qin Zhang,et al.  Optimal Tracking of Distributed Heavy Hitters and Quantiles , 2011, Algorithmica.

[15]  Jayant Madhavan,et al.  Exploring schema repositories with schemr , 2011, SGMD.

[16]  Soumen Chakrabarti,et al.  Index design and query processing for graph conductance search , 2011, The VLDB Journal.

[17]  Ronald Fagin,et al.  The structure of inverses in schema mappings , 2010, JACM.

[18]  Sunita Sarawagi,et al.  Annotating and searching web tables using entities, types and relationships , 2010, Proc. VLDB Endow..

[19]  Ganesh Ramakrishnan,et al.  Pruning Search Space for Weighted First Order Horn Clause Satisfiability , 2010, ILP.

[20]  Maarten Marx,et al.  Complete axiomatizations for XPath fragments , 2010, J. Appl. Log..

[21]  Rui Zhang,et al.  Incremental Evaluation of Visible Nearest Neighbor Queries , 2010, IEEE Transactions on Knowledge and Data Engineering.

[22]  Lars Kulik,et al.  Privacy-Aware Traffic Monitoring , 2010, IEEE Transactions on Intelligent Transportation Systems.

[23]  Xindong Wu,et al.  Mining distribution change in stock order streams , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[24]  Mukesh K. Mohania,et al.  Ratio threshold queries over distributed data sources , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[25]  Assaf Schuster,et al.  A Geometric Approach to Monitoring Threshold Functions over Distributed Data Streams , 2010, Ubiquitous Knowledge Discovery.

[26]  Sudipto Guha,et al.  SmartCIS: integrating digital and physical environments , 2010, SGMD.

[27]  Siegfried Handschuh,et al.  Learning from Linked Open Data Usage: Patterns & Metrics , 2010 .

[28]  Ashwin Srinivasan,et al.  Parameter Screening and Optimisation for ILP using Designed Experiments , 2011, J. Mach. Learn. Res..

[29]  Lars Kulik,et al.  Analysis and evaluation of V*-kNN: an efficient algorithm for moving kNN queries , 2010, The VLDB Journal.

[30]  The recovery of a schema mapping: Bringing exchanged data back , 2009, TODS.

[31]  Philip A. Bernstein,et al.  Full-Fidelity Flexible Object-Oriented XML Access , 2009, Proc. VLDB Endow..

[32]  Marcelo Arenas,et al.  Inverting Schema Mappings: Bridging the Gap between Theory and Practice , 2009, Proc. VLDB Endow..

[33]  Rahul Gupta,et al.  Answering Table Augmentation Queries from Unstructured Lists on the Web , 2009, Proc. VLDB Endow..

[34]  Jef Wijsen,et al.  On First-Order Query Rewriting for Incomplete Database Histories , 2009, 2009 16th International Symposium on Temporal Representation and Reasoning.

[35]  Somnath Banerjee,et al.  Learning to rank for quantity consensus queries , 2009, SIGIR.

[36]  Ashwin Srinivasan,et al.  An investigation into feature construction to assist word sense disambiguation , 2009, Machine Learning.

[37]  Tim Berners-Lee,et al.  Linked Data - The Story So Far , 2009, Int. J. Semantic Web Inf. Syst..

[38]  Ronald Fagin,et al.  Reverse data exchange: Coping with nulls , 2009, TODS.

[39]  Georgia Koutrika,et al.  CourseRank: a social system for course planning , 2009, SIGMOD Conference.

[40]  Samuel Madden,et al.  ZStream: a cost-based query processor for adaptively detecting composite events , 2009, SIGMOD Conference.

[41]  Filip Murlak,et al.  XML schema mappings , 2009, PODS.

[42]  Ganesh Ramakrishnan,et al.  Collective annotation of Wikipedia entities in web text , 2009, KDD.

[43]  Krithi Ramamritham,et al.  Keyword Search over Dynamic Categorized Information , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[44]  Ioana Manolescu,et al.  Performance evaluation in database research: principles and experience , 2009, EDBT '09.

[45]  Sunita Sarawagi,et al.  Efficient top-k count queries over imprecise duplicates , 2009, EDBT '09.

[46]  Vasilis Vassalos,et al.  Answering Queries Using Views , 2009, Encyclopedia of Database Systems.

[47]  Ganesh Ramakrishnan,et al.  Identification of class specific discourse patterns , 2008, CIKM '08.

[48]  Ashwin Srinivasan,et al.  Feature Construction Using Theory-Guided Sampling and Randomised Search , 2008, ILP.

[49]  Lars Kulik,et al.  The V*-Diagram: a query-dependent approach to moving KNN queries , 2008, Proc. VLDB Endow..

[50]  S. Sudarshan,et al.  Rewriting procedures for batched bindings , 2008, Proc. VLDB Endow..

[51]  David B. Lomet,et al.  Transaction time indexing with version compression , 2008, Proc. VLDB Endow..

[52]  Hendrik Decker,et al.  Classifying integrity checking methods with regard to inconsistency tolerance , 2008, PPDP.

[53]  Ryan Newton,et al.  Design and evaluation of a compiler for embedded stream programs , 2008, LCTES '08.

[54]  Cristina Sirangelo,et al.  Data exchange and schema mappings in open and closed worlds , 2011, J. Comput. Syst. Sci..

[55]  Ronald Fagin,et al.  Towards a theory of schema-mapping optimization , 2008, PODS.

[56]  Praveen Paritosh,et al.  Freebase: a collaboratively created graph database for structuring human knowledge , 2008, SIGMOD Conference.

[57]  Michael Stonebraker,et al.  OLTP through the looking glass, and what we found there , 2008, SIGMOD Conference.

[58]  Emmanuel Filiot,et al.  Querying regular sets of XML documents , 2008, LID 2008.

[59]  Krzysztof Onak,et al.  Sketching and Streaming Entropy via Approximation Theory , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[60]  Elisa Bertino,et al.  Continuous Intersection Joins Over Moving Objects , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[61]  Lars Kulik,et al.  Load Balancing for Moving Object Management in a P2P Network , 2008, DASFAA.

[62]  Jon Feldman,et al.  On distributing symmetric streaming computations , 2008, SODA '08.

[63]  Balder ten Cate,et al.  Axiomatizing the Logical Core of XPath 2.0 , 2007, Theory of Computing Systems.

[64]  M. Bruynooghe,et al.  Efficient Fixpoint Methods for Approximate Query Answering in Locally Complete Databases , 2008 .

[65]  Floris Geerts,et al.  On BP-complete query languages on K-relations , 2008 .

[66]  Xi Zhang,et al.  Profiling Sets for Preference Querying , 2008, SEBD.

[67]  Diego Calvanese,et al.  Regular XPath: Constraints, Query Containment and View-Based Answering for XML Documents , 2008 .

[68]  George H. L. Fletcher An Algebra For Basic Graph Patterns , 2008 .

[69]  Hector Perez-Urbina Rewriting Conjunctive Queries under Description Logic Constraints , 2008 .

[70]  Andrea Calì Querying Incomplete Data with Logic Programs: ER Strikes Back , 2007, ER.

[71]  Leopoldo E. Bertossi,et al.  The Consistency Extractor System: Querying Inconsistent Databases Using Answer Set Programs , 2007, SUM.

[72]  Diego Calvanese,et al.  Tractable Reasoning and Efficient Query Answering in Description Logics: The DL-Lite Family , 2007, Journal of Automated Reasoning.

[73]  Yin Zhang,et al.  STAR: Self-Tuning Aggregation for Scalable Monitoring , 2007, VLDB.

[74]  Tanzima Hashem,et al.  Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.

[75]  Ronen I. Brafman,et al.  Computing Optimal Subsets , 2007, AAAI.

[76]  Krithi Ramamritham,et al.  Efficient Execution of Continuous Incoherency Bounded Queries over Multi-Source Streaming Data , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[77]  Ling Huang,et al.  Communication-Efficient Tracking of Distributed Cumulative Triggers , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[78]  Soumen Chakrabarti,et al.  Learning random walks to rank nodes in graphs , 2007, ICML '07.

[79]  Ashwin Srinivasan,et al.  Using ILP to Construct Features for Information Extraction from Semi-structured Text , 2007, ILP.

[80]  Ronald Fagin,et al.  Quasi-inverses of schema mappings , 2007, PODS '07.

[81]  Philip A. Bernstein,et al.  Model management 2.0: manipulating richer mappings , 2007, SIGMOD '07.

[82]  Maurizio Lenzerini,et al.  On reconciling data exchange, data integration, and peer data management , 2007, PODS '07.

[83]  Val Tannen,et al.  Provenance semirings , 2007, PODS.

[84]  Philip A. Bernstein,et al.  Compiling mappings to bridge applications and databases , 2007, SIGMOD '07.

[85]  Krithi Ramamritham,et al.  Optimized query planning of continuous aggregation queries in dynamic data dissemination networks , 2007, WWW '07.

[86]  Jean-Marc Petit,et al.  Semantic sampling of existing databases through informative Armstrong databases , 2007, Inf. Syst..

[87]  Lars Kulik,et al.  Distributed Histograms for Processing Aggregate Data from Moving Objects , 2007, 2007 International Conference on Mobile Data Management.

[88]  Ling Huang,et al.  Communication-Efficient Online Detection of Network-Wide Anomalies , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[89]  Graham Cormode,et al.  Conquering the Divide: Continuous Clustering of Distributed Data Streams , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[90]  Rui Zhang,et al.  Visible Nearest Neighbor Queries , 2007, DASFAA.

[91]  Philip A. Bernstein,et al.  Implementing mapping composition , 2007, The VLDB Journal.

[92]  Ashwin Srinivasan,et al.  Word Sense Disambiguation Using Inductive Logic Programming , 2007, ILP.

[93]  Hendrik Decker,et al.  A Relaxed Approach to Integrity and Inconsistency in Databases , 2006, LPAR.

[94]  Sumit Ganguly,et al.  Estimating Entropy over Data Streams , 2006, ESA.

[95]  Ulrich Kühn Analysis of a Database and Index Encryption Scheme - Problems and Fixes , 2006, Secure Data Management.

[96]  Paolo Papotti,et al.  Nested mappings: schema mapping reloaded , 2006, VLDB.

[97]  Soumen Chakrabarti,et al.  Learning to rank networked entities , 2006, KDD '06.

[98]  Graham Cormode,et al.  Communication-efficient distributed monitoring of thresholded counts , 2006, SIGMOD Conference.

[99]  Leonid Libkin,et al.  Data exchange and incomplete information , 2006, PODS '06.

[100]  Ronald Fagin,et al.  Inverting schema mappings , 2006, TODS.

[101]  Michael Sintek,et al.  RDFBroker: A Signature-Based High-Performance RDF Store , 2006, ESWC.

[102]  Gang Chen,et al.  A Database Encryption Scheme for Enhanced Security and Easy Sharing , 2006, 2006 10th International Conference on Computer Supported Cooperative Work in Design.

[103]  Leopoldo E. Bertossi,et al.  Semantically Correct Query Answers in the Presence of Null Values , 2006, EDBT Workshops.

[104]  Hanan Samet,et al.  Building and Querying a P2P Virtual World , 2006, GeoInformatica.

[105]  S. Muthukrishnan Some Algorithmic Problems and Results in Compressed Sensing , 2006 .

[106]  Zoran Majkić,et al.  Intensional Semantics for P2P Data Integration , 2006, J. Data Semant..

[107]  Hanan Samet,et al.  Using a distributed quadtree index in peer-to-peer networks , 2007, The VLDB Journal.

[108]  Mary F. Fernández Tips on giving a good demo , 2005, SGMD.

[109]  David Wood Scaling the Kowari Metastore , 2005, WISE Workshops.

[110]  Wei Ge,et al.  A Model for an Electronic Information Marketplace , 2005, Australas. J. Inf. Syst..

[111]  Wenfei Fan,et al.  XML constraints: specification, analysis, and applications , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[112]  Maurice Bruynooghe,et al.  On the Local Closed-World Assumption of Data-Sources , 2005, BNAIC.

[113]  S. Sudarshan,et al.  Bidirectional Expansion For Keyword Search on Graph Databases , 2005, VLDB.

[114]  Mark Crovella,et al.  Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.

[115]  Ehud Gudes,et al.  Designing Secure Indexes for Encrypted Databases , 2005, DBSec.

[116]  Erhard Rahm,et al.  Supporting executable mappings in model management , 2005, SIGMOD '05.

[117]  Philip A. Bernstein,et al.  Composition of mappings given by embedded dependencies , 2005, PODS '05.

[118]  Marcelo Arenas,et al.  XML data exchange: consistency and query answering , 2005, PODS '05.

[119]  Gabriel M. Kuper,et al.  Structural properties of XPath fragments , 2003, Theor. Comput. Sci..

[120]  Krithi Ramamritham,et al.  Executing incoherency bounded continuous queries at web data aggregators , 2005, WWW '05.

[121]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[122]  Hanan Samet,et al.  A distributed quadtree index for peer-to-peer settings , 2005, 21st International Conference on Data Engineering (ICDE'05).

[123]  First-Order Query Rewriting for Inconsistent Databases , 2005, ICDT.

[124]  Jan Chomicki,et al.  Minimal-change integrity maintenance using tuple deletions , 2002, Inf. Comput..

[125]  Ronald Fagin,et al.  Composing schema mappings: second-order dependencies to the rescue , 2004, PODS '04.

[126]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[127]  William W. Cohen,et al.  Semi-Markov Conditional Random Fields for Information Extraction , 2004, NIPS.

[128]  Abhinandan Das,et al.  Distributed Set Expression Cardinality Estimation , 2004, VLDB.

[129]  Dan Suciu,et al.  The Piazza peer data management system , 2004, IEEE Transactions on Knowledge and Data Engineering.

[130]  Sergey Melnik,et al.  Generic Model Management , 2004, Lecture Notes in Computer Science.

[131]  Diego Calvanese,et al.  Logical foundations of peer-to-peer data integration , 2004, PODS '04.

[132]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[133]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[134]  Gene Tsudik,et al.  A Framework for Efficient Storage Security in RDBMS , 2004, EDBT.

[135]  Chaomei Chen,et al.  Mining the Web: Discovering knowledge from hypertext data , 2004, J. Assoc. Inf. Sci. Technol..

[136]  Leonid Libkin,et al.  Elements of Finite Model Theory , 2004, Texts in Theoretical Computer Science.

[137]  Maurizio Lenzerini Principles of P2P Data Integration , 2004, DIWeb.

[138]  J. Hellerstein,et al.  A Wakeup Call for Internet Monitoring Systems : The Case for Distributed Triggers , 2004 .

[139]  S. Muthukrishnan,et al.  Data streams: algorithms and applications , 2005, SODA '03.

[140]  Thomas Eiter,et al.  Efficient Evaluation of Logic Programs for Querying Data Integration Systems , 2003, ICLP.

[141]  Chin-Chen Chang,et al.  A database record encryption scheme using the RSA public key cryptosystem and its master keys , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..

[142]  Jayant Madhavan,et al.  Composing Mappings Among Data Sources , 2003, VLDB.

[143]  Sergio Greco,et al.  Repairs and Consistent Answers for XML Data with Functional Dependencies , 2003, Xsym.

[144]  Jennifer Widom,et al.  Adaptive filters for continuous queries over distributed data streams , 2003, SIGMOD '03.

[145]  Andrea Calì,et al.  On the decidability and complexity of query answering over inconsistent and incomplete databases , 2003, PODS.

[146]  Ronald Fagin,et al.  Data exchange: semantics and query answering , 2003, Theor. Comput. Sci..

[147]  Philip A. Bernstein,et al.  Applying Model Management to Classical Meta Data Problems , 2003, CIDR.

[148]  Data exchange: getting to the core , 2003, PODS '03.

[149]  Jignesh M. Patel,et al.  Indexing Large Trajectory Data Sets With SETI , 2003, CIDR.

[150]  Werner Kießling,et al.  Foundations of Preferences in Database Systems , 2002, VLDB.

[151]  Radek Vingralek,et al.  GnatDb: A Small-Footprint, Secure Database System , 2002, VLDB.

[152]  Prashant J. Shenoy,et al.  Maintaining Coherency of Dynamic Data in Cooperating Repositories , 2002, VLDB.

[153]  Srikanta Tirthapura,et al.  Distributed Streams Algorithms for Sliding Windows , 2002, SPAA '02.

[154]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[155]  Georg Gottlob,et al.  Monadic queries over tree-structured data , 2002, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science.

[156]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[157]  Maurizio Lenzerini,et al.  Data integration: a theoretical perspective , 2002, PODS.

[158]  William Thies,et al.  StreamIt: A Language for Streaming Applications , 2002, CC.

[159]  S. Sudarshan,et al.  Keyword searching and browsing in databases using BANKS , 2002, Proceedings 18th International Conference on Data Engineering.

[160]  Jennifer Widom,et al.  Query Processing, Resource Management, and Approximation ina Data Stream Management System , 2002 .

[161]  Alon Y. Halevy,et al.  Answering queries using views: A survey , 2001, The VLDB Journal.

[162]  Min Wang,et al.  Cryptography and relational database management systems , 2001, Proceedings 2001 International Database Engineering and Applications Symposium.

[163]  Srikanta Tirthapura,et al.  Estimating simple functions on the union of data streams , 2001, SPAA '01.

[164]  Prashant J. Shenoy,et al.  Adaptive push-pull: disseminating dynamic web data , 2001, WWW '01.

[165]  Danny Raz,et al.  Efficient reactive monitoring , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[166]  Alon Y. Halevy,et al.  MiniCon: A scalable algorithm for answering queries using views , 2000, The VLDB Journal.

[167]  Alon Y. Halevy,et al.  Theory of answering queries using views , 2000, SGMD.

[168]  Dieter Pfoser,et al.  Novel Approaches in Query Processing for Moving Object Trajectories , 2000, VLDB 2000.

[169]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[170]  Markus Schneider,et al.  A foundation for representing and querying moving objects , 2000, TODS.

[171]  Yannis Manolopoulos,et al.  Spatiotemporal Access Methods , 2000 .

[172]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[173]  Vassilis J. Tsotras,et al.  Comparison of access methods for time-evolving data , 1999, CSUR.

[174]  Jan Chomicki,et al.  Consistent query answers in inconsistent databases , 1999, PODS '99.

[175]  Alexander B. Sideridis,et al.  Time-Evolving Rule-Based Knowledge Bases , 1999, Data Knowl. Eng..

[176]  A. Szałas,et al.  A Fixpoint Approach to Second-Order Quantifier Elimination with Applications to Correspondence Theory , 1999 .

[177]  Edmund H. Durfee,et al.  Mixing and memory: emergent cooperation in an information marketplace , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).

[178]  Oliver Günther,et al.  Multidimensional access methods , 1998, CSUR.

[179]  Serge Abiteboul,et al.  Complexity of answering queries using materialized views , 1998, PODS.

[180]  Rakesh M. Verma,et al.  An Efficient Multiversion Access STructure , 1997, IEEE Trans. Knowl. Data Eng..

[181]  Michael R. Genesereth,et al.  Answering recursive queries using views , 1997, PODS '97.

[182]  Bernhard Seeger,et al.  An asymptotically optimal multiversion B-tree , 1996, The VLDB Journal.

[183]  Joann J. Ordille,et al.  Querying Heterogeneous Information Sources Using Source Descriptions , 1996, VLDB.

[184]  Alon Y. Halevy,et al.  Obtaining Complete Answers from Incomplete Databases , 1996, VLDB.

[185]  Hans-Peter Kriegel,et al.  The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.

[186]  Haim Gaifman,et al.  Decidable Optimization Problems for Database Logic Programs (Preliminary Report) , 1988, STOC 1988.

[187]  V. Lifschitz,et al.  The Stable Model Semantics for Logic Programming , 1988, ICLP/SLP.

[188]  Robert E. Tarjan,et al.  Making data structures persistent , 1986, STOC '86.

[189]  Tomasz Imielinski,et al.  Incomplete Information in Relational Databases , 1984, JACM.

[190]  Michael Stonebraker,et al.  The Performance of Concurrency Control Algorithms for Database Management Systems , 1984, VLDB.

[191]  Moshe Y. Vardi The complexity of relational query languages (Extended Abstract) , 1982, STOC '82.

[192]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[193]  Abraham Silberschatz,et al.  Database System Concepts , 1980 .

[194]  Jan Paredaens,et al.  On the Expressive Power of the Relational Algebra , 1978, Inf. Process. Lett..

[195]  J. K. Metzger,et al.  On the encipherment of search trees and random access files , 1975, SIGF.

[196]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.