Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 63-70.
• Review • Previous Articles Next Articles
SUN Zhi, SUN Xue-jiao
CLC Number:
[1]BÖRZSÖNYI S,KOSSMANN D,STOCKER K.The Skyline Operator[C]∥International Conference on Data Engineering,2001.IEEE,2002:421-430. [2]CHOMICKI J,GODFREY P,GRYZ J,et al.Skyline with presorting[C]∥International Conference on Data Engineering.IEEE,2003:717-719. [3]GODFREY P,SHIPLEY R,GRYZ J.Maximal vector computation in large data sets[C]∥International Conference on Very Large Data Bases.VLDB Endowment,2005:229-240. [4]KOSSMANN D,RAMSAK F,ROST S.Shooting stars in the sky:an online algorithm for skyline queries[C]∥International Conference on Very Large Data Bases.VLDB Endowment,2002:275-286. [5]PAPADIAS D,TAO Y,FU G,et al.An optimal and progressive algorithm for skyline queries[C]∥ACM SIGMOD International Conference on Management of Data.ACM,2003:467-478. [6]CUI B,LU H,XU Q,et al.Parallel Distributed Processing of Constrained Skyline Queries by Filtering[C]∥International Conference on Data Engineering.IEEE,2008:546-555. [7]WU P,ZHANG C,FENG Y,et al.Parallelizing Skyline Queries for Scalable Distribution[C]∥International Conference on Advances in Database Technology-EDBT.DBLP,2006:112-130. [8]PEI J,JIN W,ESTER M,et al.Catching the best views of skyline:a semantic approach based on decisive subspaces[C]∥International Conference on Very Large Data Bases.2005:253-264. [9]TAO Y,XIAO X,PEI J.SUBSKY:Efficient Computation of Skylines in Subspaces[C]∥International Conference on Data Engineering.IEEE,2006:65-65. [10]CRESPO A,GARCIA-MOLINA H.Routing indices for peer-to-peer systems[C]∥International Conference on Distributed Computing Systems.IEEE,2002:23-32. [11]HOSE K,LEMKE C,SATTLER K U.Processing relaxed skylines in PDMS using distributed data summaries[C]∥ACM International Conference on Information and Knowledge Management.DBLP,2006:425-434. [12]RATNASAMY S,FRANCIS P,HANDLEY M,et al.A scalable content-addressable network[C]∥Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications.ACM,2001:161-172. [13]WANG S,OOI B C,TUNG A K H,et al.Efficient Skyline Query Processing on Peer-to-Peer Networks[C]∥IEEE,International Conference on Data Engineering.IEEE,2007:1126-1135. [14]JAGADISH H V,OOI B C,VU Q H.BATON:a balanced tree structure for peer-to-peer networks[C]∥International Con-ference on Very Large Data Bases.VLDB Endowment,2006:661-672. [15]HUANG Z,JENSEN C S,LU H,et al.Skyline Queries Against Mobile Lightweight Devices in MANETs[C]∥International Conference on Data Engineering.IEEE,2006:66. [16]WANG S,VU Q H,OOI B C,et al.Skyframe:a framework for skyline query processing in peer-to-peer systems[J].The International Journal on Very Large Data Bases,2009,18(1):345-362. [17]CHEN L,CUI B,LU H,et al.iSky:Efficient and Progressive Skyline Computing in a Structured P2P Network[C]∥International Conference on Distributed Computing Systems.IEEE,2008:160-167. [18]LI H J,TAN Q Z,LEE W-C,et al.Efficient progressive proces-sing of skyline queries in peer-to-peer systems[C]∥InternationalConference on Scalable Information Systems.DBLP,2006:26. [19]CUI B,CHEN L,XU L,et al.Efficient Skyline Computation in Structured Peer-to-Peer Systems[J].IEEE Transactions on Knowledge & Data Engineering,2009,21(7):1059-1072. [20]HOSE K,LEMKE C,SATTLER K U,et al.A Relaxed But Not Necessarily Constrained Way from the Top to the Sky[J].Lecture Notes in Computer Science,2007,4803:399-407. [21]VLACHOU A,DOULKERIDIS C,KOTIDIS Y,et al.SKY-PEER:Efficient Subspace Skyline Computation over Distributed Data[C]∥International Conference on Data Engineering.IEEE,2007:416-425. [22]VLACHOU A,DOULKERIDIS C,KOTIDIS Y,et al.Efficient Routing of Subspace Skyline Queries over Highly Distributed Data[J].IEEE Transactions on Knowledge & Data Enginee-ring,2010,22(12):1694-1708. [23]FOTIADOU K,PITOURA E.BITPEER:continuous subspace skyline computation with distributed bitmap indexes[OL].http://zeus.cs.uoi.gr/~pitoura/distribution/damap08.pdf. [24]TAN K L,ENG P K,OOI B C.Efficient Progressive Skyline Computation[C]∥International Conference on Very Large Data Bases.2001:301-310. [25]PEI J,JIANG B,LIN X,et al.Probabilistic skylines on uncertain data[C]∥International Conference on Very Large Data Bases.VLDB Endowment,2007:15-26. [26]ZHANG Z,YANG Y,CAI R,et al.Kernel-based skyline cardinality estimation[C]∥ACM Sigmod International Conference on Management of Data.DBLP,2009:509-522. |
[1] | LI Long-fei,ZHANG Jing-zhou,WANG Peng-de,GUO Peng-jun. P2P Network Search Mechanism Based on Node Interest and Q-learning [J]. Computer Science, 2020, 47(2): 221-226. |
[2] | WU Dan-dan, LYU Xin. Location Anonymous Algorithm Based on User Collaboration under Distributed Structure [J]. Computer Science, 2019, 46(4): 158-163. |
[3] | LIU Pan, LI Hua-kang and SUN Guo-zi. Risk Observing Method Based on Short-time Multi-source Regression Algorithm on P2P Platform [J]. Computer Science, 2018, 45(5): 97-101. |
[4] | LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao. Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity [J]. Computer Science, 2018, 45(2): 8-14. |
[5] | WANG Li-e, XU Yuan-xin, LI Xian-xian and LIU Peng. P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System [J]. Computer Science, 2017, 44(9): 178-183. |
[6] | YANG Xin-lei, HE Qian, CAO Li and WANG Shi-cheng. P2P Based Massive Scalable Remote Sensing Data Distribution with Access Control [J]. Computer Science, 2017, 44(11): 268-272. |
[7] | ZHAO Ying-xiu, LIU Wen-qi, LI Jin-hai and ZHAO Ning. Credit Evaluation of P2P Lending User Based on Granular Computing and Information Fusion [J]. Computer Science, 2016, 43(9): 242-246. |
[8] | SONG Yuan-zhang. P2P Botnet Detection Based on Permutation Entropy and Multi-sensor Data Fusion on Decision Level [J]. Computer Science, 2016, 43(7): 141-146. |
[9] | SHEN Xiang-jun, YAO Yin and ZHA Zheng-jun. Video Prefetching Strategy Based on Congestion Finding with Reinforcement Learning in P2P VOD Networks [J]. Computer Science, 2015, 42(7): 258-261. |
[10] | WANG Peng-fei, LI Qian-mu and ZHU Bao-ping. Location Privacy Protection Method Based on Incremental Nearest Neighbor Query [J]. Computer Science, 2015, 42(3): 158-161. |
[11] | ZHANG Xiang-hui, HUANG Jia-qing, WU Kang-heng and LEI Zhi-bin. Survey on Real-time Video and Audio Communication Based on WebRTC [J]. Computer Science, 2015, 42(2): 1-6. |
[12] | XU Xiao-long, GONG Pei-pei, ZHANG Yun and BI Chao-guo. Mobile-agent-based Composite Data Destruction Mechanism for Cloud-P2P [J]. Computer Science, 2015, 42(10): 138-146. |
[13] | WANG Chun-zhi, ZHANG Hui-li and YE Zhi-wei. Peer-to-Peer Traffic identification Method Based on Chaos Particle Swarm Algorithm and Wavelet SVM [J]. Computer Science, 2015, 42(10): 117-121. |
[14] | CHEN Wei-dong, LI Min-qiang and ZHAO Qing-zhan. Research of Web Service Selection Trust Model on P2P Environment [J]. Computer Science, 2015, 42(1): 113-118. |
[15] | WANG Qun and DAI Xiu-yue. Research on Service Contingency Guarantee in CDN-P2P Hybrid Architecture Based Live Streaming [J]. Computer Science, 2014, 41(Z6): 466-471. |
|