Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2013
Private decayed predicate sums on streams
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 284–295https://doi.org/10.1145/2448496.2448530In many monitoring applications, recent data is more important than distant data. How does this affect privacy of data analysis? We study a general class of data analyses --- predicate sums --- in this context.
Formally, we study the problem of ...
- research-articleMarch 2013
Optimal error of query sets under the differentially-private matrix mechanism
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 272–283https://doi.org/10.1145/2448496.2448529A common goal of privacy research is to release synthetic data that satisfies a formal privacy guarantee and can be used by an analyst in place of the original data. To achieve reasonable accuracy, a synthetic data set must be tuned to support a ...
- research-articleMarch 2013
On optimal differentially private mechanisms for count-range queries
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 261–271https://doi.org/10.1145/2448496.2448528While there is a large and growing body of literature on differentially private mechanisms for answering various classes of queries, to the best of our knowledge "count-range" queries have not been studied. These are a natural class of queries that ask "...
- research-articleMarch 2013
Extracting minimum-weight tree patterns from a schema with neighborhood constraints
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 249–260https://doi.org/10.1145/2448496.2448526The task of formulating queries is greatly facilitated when they can be generated automatically from some given data values, schema concepts or both (e.g., names of particular entities and XML tags). This automation is the basis of various database ...
- research-articleMarch 2013
Certain and possible XPath answers
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 237–248https://doi.org/10.1145/2448496.2448525Formulating an XPath query over an XML document is a difficult chore for a non-expert user. This paper introduces a novel approach to ease the querying process. Instead of specifying a query, the user simply marks positive examples χ+ of nodes that fit ...
-
- research-articleMarch 2013
Using the crowd for top-k and group-by queries
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 225–236https://doi.org/10.1145/2448496.2448524Group-by and top-k are fundamental constructs in database queries. However, the criteria used for grouping and ordering certain types of data -- such as unlabeled photos clustered by the same person ordered by age -- are difficult to evaluate by ...
- research-articleMarch 2013
Access patterns and integrity constraints revisited
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 213–224https://doi.org/10.1145/2448496.2448522We consider which queries are answerable in the presence of access restrictions and integrity constraints, and which portions of the schema are accessible in the presence of access restrictions and constraints. Unlike prior work, we focus on integrity ...
- research-articleMarch 2013
Containment of pattern-based queries over data trees
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 201–212https://doi.org/10.1145/2448496.2448521We study static analysis, in particular the containment problem, for analogs of conjunctive queries over XML documents. The problem has been studied for queries based on arbitrary patterns, not necessarily following the tree structure of documents. ...
- research-articleMarch 2013
Schema mappings and data exchange for graph databases
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 189–200https://doi.org/10.1145/2448496.2448520Data exchange and schema mapping management have received little attention so far in the graph database scenario, and tools developed in this context for relational databases have significant drawbacks in the context of graph-structured data. In this ...
- research-articleMarch 2013
Annotations are relative
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 177–188https://doi.org/10.1145/2448496.2448518Most systems that have been developed for annotation of data assume a two-level structure in which annotation is superimposed on, and separate from, the data. However there are many cases in which an annotation may itself be annotated. For example ...
- research-articleMarch 2013
A propagation model for provenance views of public/private workflows
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 165–176https://doi.org/10.1145/2448496.2448517We study the problem of concealing functionality of a proprietary or private module when provenance information is shown over repeated executions of a workflow which contains both public and private modules. Our approach is to use provenance views to ...
- research-articleMarch 2013
Algebraic structures for capturing the provenance of SPARQL queries
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 153–164https://doi.org/10.1145/2448496.2448516We show that the evaluation of SPARQL algebra queries on various notions of annotated RDF graphs can be seen as particular cases of the evaluation of these queries on RDF graphs annotated with elements of so-called spm-semirings. Spm-semirings extend ...
- research-articleMarch 2013
Definability problems for graph query languages
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 141–152https://doi.org/10.1145/2448496.2448514Given a graph, a relation on its nodes, and a query language Q of interest, we study the Q-definability problem which amounts to deciding whether there exists a query in Q defining precisely the given relation over the given graph. Previous research has ...
- research-articleMarch 2013
Querying graph databases with XPath
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 129–140https://doi.org/10.1145/2448496.2448513XPath plays a prominent role as an XML navigational language due to several factors, including its ability to express queries of interest, its close connection to yardstick database query languages (e.g., first-order logic), and the low complexity of ...
- research-articleMarch 2013
Walk logic as a framework for path query languages on graph databases
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 117–128https://doi.org/10.1145/2448496.2448512Motivated by the current interest in languages for expressing path queries to graph databases, this paper proposes to investigate Walk Logic (WL): the extension of first-order logic on finite graphs with the possibility to explicitly quantify over ...
- research-articleMarch 2013
On optimum left-to-right strategies for active context-free games
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 105–116https://doi.org/10.1145/2448496.2448510Active context-free games are two-player games on strings over finite alphabets with one player trying to rewrite the input string to match a target specification. These games have been investigated in the context of exchanging Active XML (AXML) data. ...
- research-articleMarch 2013
Recursive queries on trees and data trees
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 93–104https://doi.org/10.1145/2448496.2448509The analysis of datalog programs over relational structures has been studied in depth, most notably the problem of containment. The analysis problems that have been considered were shown to be undecidable with the exception of (i) containment of ...
- research-articleMarch 2013
Structural tractability of counting of solutions to conjunctive queries
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 81–92https://doi.org/10.1145/2448496.2448508In this paper we explore the problem of counting solutions to conjunctive queries. We consider a parameter called the quantified star size of a formula φ which measures how the free variables are spread in φ. We show that for conjunctive queries that ...
- research-articleMarch 2013
XML compression via DAGs
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 69–80https://doi.org/10.1145/2448496.2448506Unranked trees can be represented using their minimal dag (directed acyclic graph). For XML this achieves high compression ratios due to their repetitive mark up. Unranked trees are often represented through first child/next sibling (fcns) encoded ...
- research-articleMarch 2013
Which DTDs are streaming bounded repairable?
ICDT '13: Proceedings of the 16th International Conference on Database TheoryPages 57–68https://doi.org/10.1145/2448496.2448505Integrity constraint management concerns both checking whether data is valid and taking action to restore correctness when invalid data is discovered. In XML the notion of valid data can be captured by schema languages such as Document Type Definitions (...