2011
DOI: 10.1007/s00778-011-0220-3
|View full text |Cite
|
Sign up to set email alerts
|

A unified approach to ranking in probabilistic databases

Abstract: The dramatic growth in the number of application domains that naturally generate probabilistic, uncertain data has resulted in a need for efficiently supporting complex querying and decision-making over such data. In this paper, we present a unified approach to ranking and top-k query processing in probabilistic databases by viewing it as a multi-criteria optimization problem, and by deriving a set of features that capture the key properties of a probabilistic dataset that dictate the ranked result. We contend… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
93
0
2

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 72 publications
(95 citation statements)
references
References 51 publications
(101 reference statements)
0
93
0
2
Order By: Relevance
“…Tuples in L are processed one by one in the second for loop to calculate P k 1 (t j ) and update P k 1 …”
Section: (T (T I )) H 2 (T (T I )) and H(t (T I )); If H(t (Tmentioning
confidence: 99%
See 3 more Smart Citations
“…Tuples in L are processed one by one in the second for loop to calculate P k 1 (t j ) and update P k 1 …”
Section: (T (T I )) H 2 (T (T I )) and H(t (T I )); If H(t (Tmentioning
confidence: 99%
“…Some x-tuples with negligible P k 1 probabilities can be pruned early. In this section, we estimate an upper bound of P k 1 …”
Section: Pruning Strategymentioning
confidence: 99%
See 2 more Smart Citations
“…It is well known that the multiplication of two polynomials of degree O(n) can be done in O(n log n) time using FFT. Furthermore, the approach by [19], using divide-and-conquer and Fast Fourier Transformation allows us to further reduce this time complexity to O(n log 2 n). Unless s dir is the root, s dir uses Corollaries 1 and 2 to reduce the size of its polynomial, and sends the resulting polynomial to its parent node.…”
Section: XVIImentioning
confidence: 99%