callback( { "result":{ "query":":facetid:toc:\"db/journals/tods/tods34.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"693.76" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"25", "@dc":"25", "@oc":"25", "@id":"43475481", "text":":facetid:toc:db/journals/tods/tods34.bht" } }, "hits":{ "@total":"25", "@computed":"25", "@sent":"25", "@first":"0", "hit":[{ "@score":"1", "@id":"5088380", "info":{"authors":{"author":[{"@pid":"a/SergeAbiteboul","text":"Serge Abiteboul"},{"@pid":"s/LucSegoufin","text":"Luc Segoufin"},{"@pid":"v/VictorVianu","text":"Victor Vianu"}]},"title":"Static analysis of active XML systems.","venue":"ACM Trans. Database Syst.","volume":"34","number":"4","pages":"23:1-23:44","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/AbiteboulSV09","doi":"10.1145/1620585.1620590","ee":"https://doi.org/10.1145/1620585.1620590","url":"https://dblp.org/rec/journals/tods/AbiteboulSV09"}, "url":"URL#5088380" }, { "@score":"1", "@id":"5088381", "info":{"authors":{"author":[{"@pid":"a/PankajKAgarwal","text":"Pankaj K. Agarwal"},{"@pid":"22/6484","text":"Junyi Xie"},{"@pid":"y/JunYang1","text":"Jun Yang 0001"},{"@pid":"22/4635-5","text":"Hai Yu 0005"}]},"title":"Input-sensitive scalable continuous join query processing.","venue":"ACM Trans. Database Syst.","volume":"34","number":"3","pages":"13:1-13:41","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/AgarwalXYY09","doi":"10.1145/1567274.1567275","ee":"https://doi.org/10.1145/1567274.1567275","url":"https://dblp.org/rec/journals/tods/AgarwalXYY09"}, "url":"URL#5088381" }, { "@score":"1", "@id":"5088382", "info":{"authors":{"author":[{"@pid":"a/FabrizioAngiulli","text":"Fabrizio Angiulli"},{"@pid":"90/3977","text":"Fabio Fassetti"},{"@pid":"p/LuigiPalopoli","text":"Luigi Palopoli 0001"}]},"title":"Detecting outlying properties of exceptional objects.","venue":"ACM Trans. Database Syst.","volume":"34","number":"1","pages":"7:1-7:62","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/AngiulliFP09","doi":"10.1145/1508857.1508864","ee":"https://doi.org/10.1145/1508857.1508864","url":"https://dblp.org/rec/journals/tods/AngiulliFP09"}, "url":"URL#5088382" }, { "@score":"1", "@id":"5088383", "info":{"authors":{"author":[{"@pid":"76/6735","text":"Marcelo Arenas"},{"@pid":"12/6407-1","text":"Jorge Pérez 0001"},{"@pid":"72/4028","text":"Cristian Riveros"}]},"title":"The recovery of a schema mapping: Bringing exchanged data back.","venue":"ACM Trans. Database Syst.","volume":"34","number":"4","pages":"22:1-22:48","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/ArenasPR09","doi":"10.1145/1620585.1620589","ee":"https://doi.org/10.1145/1620585.1620589","url":"https://dblp.org/rec/journals/tods/ArenasPR09"}, "url":"URL#5088383" }, { "@score":"1", "@id":"5088384", "info":{"authors":{"author":[{"@pid":"b/MichaelBenedikt","text":"Michael Benedikt"},{"@pid":"k/ChristophKoch","text":"Christoph Koch 0001"}]},"title":"From XQuery to relational logics.","venue":"ACM Trans. Database Syst.","volume":"34","number":"4","pages":"25:1-25:48","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/BenediktK09","doi":"10.1145/1620585.1620592","ee":"https://doi.org/10.1145/1620585.1620592","url":"https://dblp.org/rec/journals/tods/BenediktK09"}, "url":"URL#5088384" }, { "@score":"1", "@id":"5088385", "info":{"authors":{"author":[{"@pid":"39/4287","text":"Michael J. Cahill"},{"@pid":"r/UweRohm","text":"Uwe Röhm"},{"@pid":"f/AlanDavidFekete","text":"Alan D. Fekete"}]},"title":"Serializable isolation for snapshot databases.","venue":"ACM Trans. Database Syst.","volume":"34","number":"4","pages":"20:1-20:42","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/CahillRF09","doi":"10.1145/1620585.1620587","ee":"https://doi.org/10.1145/1620585.1620587","url":"https://dblp.org/rec/journals/tods/CahillRF09"}, "url":"URL#5088385" }, { "@score":"1", "@id":"5088386", "info":{"authors":{"author":[{"@pid":"06/4171","text":"James Cheng"},{"@pid":"07/3111","text":"Yiping Ke"},{"@pid":"n/WilfredNg","text":"Wilfred Ng"}]},"title":"Efficient query processing on graph databases.","venue":"ACM Trans. Database Syst.","volume":"34","number":"1","pages":"2:1-2:48","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/ChengKN09","doi":"10.1145/1508857.1508859","ee":"https://doi.org/10.1145/1508857.1508859","url":"https://dblp.org/rec/journals/tods/ChengKN09"}, "url":"URL#5088386" }, { "@score":"1", "@id":"5088387", "info":{"authors":{"author":[{"@pid":"77/6228","text":"Chi-Yin Chow"},{"@pid":"94/5893","text":"Mohamed F. Mokbel"},{"@pid":"a/WGAref","text":"Walid G. Aref"}]},"title":"Casper*: Query processing for location services without compromising privacy.","venue":"ACM Trans. Database Syst.","volume":"34","number":"4","pages":"24:1-24:48","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/ChowMA09","doi":"10.1145/1620585.1620591","ee":"https://doi.org/10.1145/1620585.1620591","url":"https://dblp.org/rec/journals/tods/ChowMA09"}, "url":"URL#5088387" }, { "@score":"1", "@id":"5088388", "info":{"authors":{"author":[{"@pid":"c/SaraCohen","text":"Sara Cohen"},{"@pid":"74/3195","text":"Benny Kimelfeld"},{"@pid":"26/5086","text":"Yehoshua Sagiv"}]},"title":"Incorporating constraints in probabilistic XML.","venue":"ACM Trans. Database Syst.","volume":"34","number":"3","pages":"18:1-18:45","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/CohenKS09","doi":"10.1145/1567274.1567280","ee":"https://doi.org/10.1145/1567274.1567280","url":"https://dblp.org/rec/journals/tods/CohenKS09"}, "url":"URL#5088388" }, { "@score":"1", "@id":"5088389", "info":{"authors":{"author":[{"@pid":"83/3631","text":"Jeffrey Considine"},{"@pid":"86/6294","text":"Marios Hadjieleftheriou"},{"@pid":"l/FeifeiLi","text":"Feifei Li 0001"},{"@pid":"b/JohnWByers","text":"John W. Byers"},{"@pid":"k/GeorgeKollios","text":"George Kollios"}]},"title":"Robust approximate aggregation in sensor data management systems.","venue":"ACM Trans. Database Syst.","volume":"34","number":"1","pages":"6:1-6:35","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/ConsidineHLBK09","doi":"10.1145/1508857.1508863","ee":"https://doi.org/10.1145/1508857.1508863","url":"https://dblp.org/rec/journals/tods/ConsidineHLBK09"}, "url":"URL#5088389" }, { "@score":"1", "@id":"5088390", "info":{"authors":{"author":[{"@pid":"80/6521","text":"Gabriel Ghinita"},{"@pid":"08/5342","text":"Panagiotis Karras"},{"@pid":"97/3036","text":"Panos Kalnis"},{"@pid":"34/6253","text":"Nikos Mamoulis"}]},"title":"A framework for efficient data anonymization under privacy and accuracy constraints.","venue":"ACM Trans. Database Syst.","volume":"34","number":"2","pages":"9:1-9:47","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/GhinitaKKM09","doi":"10.1145/1538909.1538911","ee":"https://doi.org/10.1145/1538909.1538911","url":"https://dblp.org/rec/journals/tods/GhinitaKKM09"}, "url":"URL#5088390" }, { "@score":"1", "@id":"5088391", "info":{"authors":{"author":[{"@pid":"h/SvenHartmann","text":"Sven Hartmann"},{"@pid":"l/SebastianLink","text":"Sebastian Link"}]},"title":"Efficient reasoning about a robust XML key fragment.","venue":"ACM Trans. Database Syst.","volume":"34","number":"2","pages":"10:1-10:33","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/HartmannL09","doi":"10.1145/1538909.1538912","ee":"https://doi.org/10.1145/1538909.1538912","url":"https://dblp.org/rec/journals/tods/HartmannL09"}, "url":"URL#5088391" }, { "@score":"1", "@id":"5088392", "info":{"authors":{"author":[{"@pid":"h/BingshengHe","text":"Bingsheng He"},{"@pid":"76/1844","text":"Mian Lu"},{"@pid":"80/4136","text":"Ke Yang"},{"@pid":"19/5914","text":"Rui Fang"},{"@pid":"42/5865","text":"Naga K. Govindaraju"},{"@pid":"l/QiongLuo","text":"Qiong Luo 0001"},{"@pid":"67/6038","text":"Pedro V. Sander"}]},"title":"Relational query coprocessing on graphics processors.","venue":"ACM Trans. Database Syst.","volume":"34","number":"4","pages":"21:1-21:39","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/HeLYFGLS09","doi":"10.1145/1620585.1620588","ee":"https://doi.org/10.1145/1620585.1620588","url":"https://dblp.org/rec/journals/tods/HeLYFGLS09"}, "url":"URL#5088392" }, { "@score":"1", "@id":"5088393", "info":{"authors":{"author":[{"@pid":"68/6659","text":"Alpa Jain"},{"@pid":"39/986","text":"Panagiotis G. Ipeirotis"}]},"title":"A quality-aware optimizer for information extraction.","venue":"ACM Trans. Database Syst.","volume":"34","number":"1","pages":"5:1-5:48","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/JainI09","doi":"10.1145/1508857.1508862","ee":"https://doi.org/10.1145/1508857.1508862","url":"https://dblp.org/rec/journals/tods/JainI09"}, "url":"URL#5088393" }, { "@score":"1", "@id":"5088394", "info":{"authors":{"author":[{"@pid":"55/2913","text":"Jürgen Krämer"},{"@pid":"s/BernhardSeeger","text":"Bernhard Seeger"}]},"title":"Semantics and implementation of continuous sliding window queries over data streams.","venue":"ACM Trans. Database Syst.","volume":"34","number":"1","pages":"4:1-4:49","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/KramerS09","doi":"10.1145/1508857.1508861","ee":"https://doi.org/10.1145/1508857.1508861","url":"https://dblp.org/rec/journals/tods/KramerS09"}, "url":"URL#5088394" }, { "@score":"1", "@id":"5088395", "info":{"authors":{"author":[{"@pid":"42/5120-5","text":"Yi Lin 0005"},{"@pid":"k/BettinaKemme","text":"Bettina Kemme"},{"@pid":"40/4806","text":"Ricardo Jiménez-Peris"},{"@pid":"97/3041","text":"Marta Patiño-Martínez"},{"@pid":"a/JEArmendarizInigo","text":"José Enrique Armendáriz-Iñigo"}]},"title":"Snapshot isolation and integrity constraints in replicated databases.","venue":"ACM Trans. Database Syst.","volume":"34","number":"2","pages":"11:1-11:49","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/LinKJPA09","doi":"10.1145/1538909.1538913","ee":"https://doi.org/10.1145/1538909.1538913","url":"https://dblp.org/rec/journals/tods/LinKJPA09"}, "url":"URL#5088395" }, { "@score":"1", "@id":"5088396", "info":{"authors":{"author":[{"@pid":"m/AlexanderMarkowetz","text":"Alexander Markowetz"},{"@pid":"56/2998-1","text":"Yin Yang 0001"},{"@pid":"p/DimitrisPapadias","text":"Dimitris Papadias"}]},"title":"Keyword search over relational tables and streams.","venue":"ACM Trans. Database Syst.","volume":"34","number":"3","pages":"17:1-17:51","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/MarkowetzYP09","doi":"10.1145/1567274.1567279","ee":"https://doi.org/10.1145/1567274.1567279","url":"https://dblp.org/rec/journals/tods/MarkowetzYP09"}, "url":"URL#5088396" }, { "@score":"1", "@id":"5088397", "info":{"authors":{"author":[{"@pid":"24/2530","text":"Chaitanya Mishra"},{"@pid":"k/NickKoudas","text":"Nick Koudas"}]},"title":"The design of a query monitoring system.","venue":"ACM Trans. Database Syst.","volume":"34","number":"1","pages":"1:1-1:51","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/MishraK09","doi":"10.1145/1508857.1508858","ee":"https://doi.org/10.1145/1508857.1508858","url":"https://dblp.org/rec/journals/tods/MishraK09"}, "url":"URL#5088397" }, { "@score":"1", "@id":"5088398", "info":{"authors":{"author":[{"@pid":"12/6407-1","text":"Jorge Pérez 0001"},{"@pid":"76/6735","text":"Marcelo Arenas"},{"@pid":"g/ClaudioGutierrez","text":"Claudio Gutierrez 0001"}]},"title":"Semantics and complexity of SPARQL.","venue":"ACM Trans. Database Syst.","volume":"34","number":"3","pages":"16:1-16:45","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/PerezAG09","doi":"10.1145/1567274.1567278","ee":"https://doi.org/10.1145/1567274.1567278","url":"https://dblp.org/rec/journals/tods/PerezAG09"}, "url":"URL#5088398" }, { "@score":"1", "@id":"5088399", "info":{"authors":{"author":[{"@pid":"67/3593","text":"Mehdi Sharifzadeh"},{"@pid":"s/CyrusShahabi","text":"Cyrus Shahabi"},{"@pid":"89/6091","text":"Leyla Kazemi"}]},"title":"Processing spatial skyline queries in both vector spaces and spatial network databases.","venue":"ACM Trans. Database Syst.","volume":"34","number":"3","pages":"14:1-14:45","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/SharifzadehSK09","doi":"10.1145/1567274.1567276","ee":"https://doi.org/10.1145/1567274.1567276","url":"https://dblp.org/rec/journals/tods/SharifzadehSK09"}, "url":"URL#5088399" }, { "@score":"1", "@id":"5088400", "info":{"authors":{"author":[{"@pid":"s/DennisShasha","text":"Dennis E. Shasha"},{"@pid":"l/MLenzerini","text":"Maurizio Lenzerini"},{"@pid":"o/ZMeralOzsoyoglu","text":"Z. Meral Özsoyoglu"}]},"title":"Foreword to TODS SIGMOD/PODS 2008 special issue.","venue":"ACM Trans. Database Syst.","volume":"34","number":"4","pages":"19:1-19:2","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/ShashaLO09","doi":"10.1145/1620585.1620586","ee":"https://doi.org/10.1145/1620585.1620586","url":"https://dblp.org/rec/journals/tods/ShashaLO09"}, "url":"URL#5088400" }, { "@score":"1", "@id":"5088401", "info":{"authors":{"author":[{"@pid":"45/1145","text":"Joshua Spiegel"},{"@pid":"p/NeoklisPolyzotis","text":"Neoklis Polyzotis"}]},"title":"TuG synopses for approximate query answering.","venue":"ACM Trans. Database Syst.","volume":"34","number":"1","pages":"3:1-3:56","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/SpiegelP09","doi":"10.1145/1508857.1508860","ee":"https://doi.org/10.1145/1508857.1508860","url":"https://dblp.org/rec/journals/tods/SpiegelP09"}, "url":"URL#5088401" }, { "@score":"1", "@id":"5088402", "info":{"authors":{"author":[{"@pid":"40/38","text":"Weifeng Su"},{"@pid":"15/6282","text":"Jiying Wang"},{"@pid":"l/FHLochovsky","text":"Frederick H. Lochovsky"}]},"title":"ODE: Ontology-assisted data extraction.","venue":"ACM Trans. Database Syst.","volume":"34","number":"2","pages":"12:1-12:35","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/SuWL09","doi":"10.1145/1538909.1538914","ee":"https://doi.org/10.1145/1538909.1538914","url":"https://dblp.org/rec/journals/tods/SuWL09"}, "url":"URL#5088402" }, { "@score":"1", "@id":"5088403", "info":{"authors":{"author":[{"@pid":"w/RaymondChiWingWong","text":"Raymond Chi-Wing Wong"},{"@pid":"f/AdaWaiCheeFu","text":"Ada Wai-Chee Fu"},{"@pid":"w/KeWang","text":"Ke Wang 0001"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Anonymization-based attacks in privacy-preserving data publishing.","venue":"ACM Trans. Database Syst.","volume":"34","number":"2","pages":"8:1-8:46","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/WongFWP09","doi":"10.1145/1538909.1538910","ee":"https://doi.org/10.1145/1538909.1538910","url":"https://dblp.org/rec/journals/tods/WongFWP09"}, "url":"URL#5088403" }, { "@score":"1", "@id":"5088404", "info":{"authors":{"author":[{"@pid":"43/1219-1","text":"Ke Yi 0001"},{"@pid":"l/FeifeiLi","text":"Feifei Li 0001"},{"@pid":"c/GrahamCormode","text":"Graham Cormode"},{"@pid":"86/6294","text":"Marios Hadjieleftheriou"},{"@pid":"k/GeorgeKollios","text":"George Kollios"},{"@pid":"s/DiveshSrivastava","text":"Divesh Srivastava"}]},"title":"Small synopses for group-by query verification on outsourced data streams.","venue":"ACM Trans. Database Syst.","volume":"34","number":"3","pages":"15:1-15:42","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tods/YiLCHKS09","doi":"10.1145/1567274.1567277","ee":"https://doi.org/10.1145/1567274.1567277","url":"https://dblp.org/rec/journals/tods/YiLCHKS09"}, "url":"URL#5088404" } ] } } } )