暂无分享,去创建一个
[1] Clarence J M Tauro,et al. Comparative Study of the New Generation, Agile, Scalable, High Performance NOSQL Databases , 2012 .
[2] Hendrik Decker,et al. Avenues to Flexible Data Integrity Checking , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).
[3] David R. Karger,et al. Web Caching with Consistent Hashing , 1999, Comput. Networks.
[4] Davide Martinenghi. Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins , 2004, FQAS.
[5] Henning Christiansen,et al. Simplification of Integrity Constraints for Data Integration , 2004, FoIKS.
[6] Henning Christiansen,et al. Transaction Management with Integrity Checking , 2005, DEXA.
[7] Hendrik Decker,et al. Inconsistency-Tolerant Integrity Checking , 2011, IEEE Transactions on Knowledge and Data Engineering.
[8] Werner Vogels,et al. Dynamo: amazon's highly available key-value store , 2007, SOSP.
[9] Davide Martinenghi,et al. Rank-Join Algorithms for Search Computing , 2009, SeCO Workshop.
[10] Hendrik Decker,et al. Modeling, Measuring and Monitoring the Quality of Information , 2009, ER Workshops.
[11] Davide Martinenghi,et al. Top-k diversity queries over bounded regions , 2013, TODS.
[12] Davide Martinenghi,et al. On the difference between checking integrity constraints before or after updates , 2013, ArXiv.
[13] Andrea Calì,et al. Dynamic Query Optimization under Access Limitations and Dependencies , 2009, J. Univers. Comput. Sci..
[14] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[15] Davide Martinenghi,et al. Proximity rank join , 2010, Proc. VLDB Endow..
[16] Henning Christiansen,et al. On Using Simplification and Correction Tables for Integrity Maintenance in Integrated Databases , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).
[17] Andrea Calì,et al. Optimization of Query Plans in the presence of Access Limitations , 2007, EROW.
[18] Davide Martinenghi,et al. Advanced Techniques for Efficient Data Integrity Checking , 2005 .
[19] Laks V. S. Lakshmanan,et al. Selected papers from the Logic in Databases Workshop 2008 , 2010, J. Appl. Log..
[20] Andrea Calì,et al. Optimizing Query Processing for the Hidden Web , 2010, 2010 12th International Asia-Pacific Web Conference.
[21] Davide Martinenghi. Access Pattern , 2011, Encyclopedia of Cryptography and Security.
[22] Henning Christiansen,et al. Incremental Integrity Checking: Limitations and Possibilities , 2005, LPAR.
[23] Davide Martinenghi,et al. Ranking with uncertain scoring functions: semantics and sensitivity measures , 2011, SIGMOD '11.
[24] Hendrik Decker,et al. A Relaxed Approach to Integrity and Inconsistency in Databases , 2006, LPAR.
[25] Laks V. S. Lakshmanan,et al. Logic in databases: report on the LID 2008 workshop , 2010, SGMD.
[26] Henning Christiansen,et al. Efficient Integrity Checking for Databases with Recursive Views , 2005, ADBIS.
[27] Henning Christiansen,et al. Symbolic constraints for meta-logic programming , 2000, Appl. Artif. Intell..
[28] Hendrik Decker,et al. Database Integrity Checking , 2009, Database Technologies: Concepts, Methodologies, Tools, and Applications.
[29] Andrea Calì,et al. Querying incomplete data over extended ER schemata , 2010, Theory and Practice of Logic Programming.
[30] Davide Martinenghi,et al. Optimal Database Locks for Efficient Integrity Checking , 2004, ADBIS.
[31] Andrea Calì,et al. Query Optimisation for Web Data Sources: Minimisation of the Number of Accesses , 2007, SEBD.
[32] Hendrik Decker,et al. Classifying integrity checking methods with regard to inconsistency tolerance , 2008, PPDP.
[33] David J. DeWitt,et al. Can the Elephants Handle the NoSQL Onslaught? , 2012, Proc. VLDB Endow..
[34] Hendrik Decker,et al. Integrity Checking and Maintenance in Relational and Deductive Database and Beyond , 2007 .
[35] Davide Martinenghi,et al. Efficient Diversification of Top-k Queries over Bounded Regions , 2012, SEBD.
[36] Davide Martinenghi,et al. Top-k bounded diversification , 2012, SIGMOD Conference.
[37] Henning Christiansen,et al. Simplification of Database Integrity Constraints Revisited: A Transformational Approach , 2003, LOPSTR.
[38] Henning Christiansen,et al. On Simplification of Database Integrity Constraints , 2006, Fundam. Informaticae.
[39] Hendrik Decker,et al. Getting Rid of Straitjackets for Flexible Integrity Checking , 2007, 18th International Workshop on Database and Expert Systems Applications (DEXA 2007).
[40] Laurian M. Chirica,et al. The entity-relationship model: toward a unified view of data , 1975, SIGF.
[41] Hendrik Decker,et al. Checking Violation Tolerance of Approaches to Database Integrity , 2006, ADVIS.
[42] Davide Martinenghi,et al. Top-k pipe join , 2010, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010).
[43] Davide Martinenghi,et al. Cost-Aware Rank Join with Random and Sorted Access , 2012, IEEE Transactions on Knowledge and Data Engineering.
[44] Davide Martinenghi,et al. Proximity measures for rank join , 2012, ACM Trans. Database Syst..
[45] Andrea Calì,et al. Conjunctive Query Containment under Access Limitations , 2008, ER.
[46] Andrea Calì,et al. Querying Data under Access Limitations , 2008, 2008 IEEE 24th International Conference on Data Engineering.