{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:00:37Z","timestamp":1743112837030,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030295509"},{"type":"electronic","value":"9783030295516"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29551-6_64","type":"book-chapter","created":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T12:04:02Z","timestamp":1566302642000},"page":"726-738","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Agile Query Processing in Statistical Databases: A Process-In-Memory Approach"],"prefix":"10.1007","author":[{"given":"Shanshan","family":"Lu","sequence":"first","affiliation":[]},{"given":"Peiquan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Shouhong","family":"Wan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,21]]},"reference":[{"key":"64_CR1","volume-title":"Encyclopedia of Database Systems","author":"A Gupta","year":"2018","unstructured":"Gupta, A.: Statistical data management. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of Database Systems, 2nd edn. Springer, Boston (2018)","edition":"2"},{"key":"64_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-52342-1_18","volume-title":"Statistical and Scientific Database Management","author":"M Rafanelli","year":"1990","unstructured":"Rafanelli, M., Shoshani, A.: Storm: a statistical object representation model. In: Michalewicz, Z. (ed.) SSDBM 1990. LNCS, vol. 420, pp. 14\u201329. Springer, Heidelberg (1990). \nhttps:\/\/doi.org\/10.1007\/3-540-52342-1_18"},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Shoshani, A.: OLAP and statistical databases: similarities and differences. In: PODS, pp. 185\u2013196 (1997)","DOI":"10.1145\/263661.263682"},{"key":"64_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-69861-6_12","volume-title":"Security, Privacy, and Trust in Modern. Data Management Data-Centric Systems and Applications","author":"L Brankovic","year":"2007","unstructured":"Brankovic, L., Giggins, H.: Statistical database security. In: Petkovi\u0107, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern. Data Management Data-Centric Systems and Applications, pp. 167\u2013181. Springer, Heidelberg (2007)"},{"key":"64_CR5","unstructured":"Shoshani, A., Olken, F., Wong, H.K.T.: Characteristics of scientific databases. In: VLDB, pp. 147\u2013160 (1984)"},{"key":"64_CR6","unstructured":"Shoshani A. Statistical databases: characteristics, problems, and some solutions. In: VLDB, pp. 208\u2013222 (1982)"},{"key":"64_CR7","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1109\/TSE.1985.231851","volume":"10","author":"A Shoshani","year":"1985","unstructured":"Shoshani, A., Wong, H.K.T.: Statistical and scientific database issues. IEEE Trans. Software Eng. 10, 1040\u20131047 (1985)","journal-title":"IEEE Trans. Software Eng."},{"issue":"1","key":"64_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1287\/ijoc.2014.0607","volume":"27","author":"H Lu","year":"2015","unstructured":"Lu, H., Vaidya, J., et al.: Statistical database auditing without query denial threat. INFORMS J. Comput. 27(1), 20\u201334 (2015)","journal-title":"INFORMS J. Comput."},{"issue":"3","key":"64_CR9","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s11786-018-0343-7","volume":"12","author":"J Ryan","year":"2018","unstructured":"Ryan, J.: A brief survey on the contribution of Mirka Miller to the security of statistical databases. Math. Comput. Sci. 12(3), 255\u2013262 (2018)","journal-title":"Math. Comput. Sci."},{"key":"64_CR10","volume-title":"Encyclopedia of Database Systems","author":"J Domingo-Ferrer","year":"2018","unstructured":"Domingo-Ferrer, J.: Inference control in statistical databases. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of Database Systems, 2nd edn. Springer, Boston (2018)","edition":"2"},{"key":"64_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-540-24741-8_12","volume-title":"Advances in Database Technology - EDBT 2004","author":"CC Aggarwal","year":"2004","unstructured":"Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., et al. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 183\u2013199. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24741-8_12"},{"key":"64_CR12","unstructured":"Skinner, G., Chang, E., et al.: Shield privacy Hippocratic security method for virtual community. In: IECON, pp. 472\u2013479 (2004)"},{"key":"64_CR13","unstructured":"Baranczyk, S., Konik, R., et al.: Forecasting query access plan obsolescence: U.S. Patent 9, 990, 396 (2018)"},{"key":"64_CR14","unstructured":"Xike, X., Xingjun, H., Torben, P., Peiquan, J., Jinchuan, C.: OLAP over probabilistic data cubes I: Aggregating, materializing, and querying. In: ICDE, pp. 799\u2013810 (2016)"},{"key":"64_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-69497-7_6","volume-title":"Scientific and Statistical Database Management","author":"G Cormode","year":"2008","unstructured":"Cormode, G., Korn, F., Muthukrishnan, S., Srivastava, D.: Summarizing two-dimensional data with skyline-based statistical descriptors. In: Lud\u00e4scher, B., Mamoulis, N. (eds.) SSDBM 2008. LNCS, vol. 5069, pp. 42\u201360. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-69497-7_6"},{"key":"64_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-540-69497-7_4","volume-title":"Scientific and Statistical Database Management","author":"R Gemulla","year":"2008","unstructured":"Gemulla, R., R\u00f6sch, P., Lehner, W.: Linked bernoulli synopses: sampling along foreign keys. In: Lud\u00e4scher, B., Mamoulis, N. (eds.) SSDBM 2008. LNCS, vol. 5069, pp. 6\u201323. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-69497-7_4"},{"key":"64_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-69497-7_7","volume-title":"Scientific and Statistical Database Management","author":"S Singh","year":"2008","unstructured":"Singh, S., Mayfield, C., Shah, R., Prabhakar, S., Hambrusch, S.: Query selectivity estimation for uncertain data. In: Lud\u00e4scher, B., Mamoulis, N. (eds.) SSDBM 2008. LNCS, vol. 5069, pp. 61\u201378. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-69497-7_7"},{"key":"64_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-540-69497-7_5","volume-title":"Scientific and Statistical Database Management","author":"F Wang","year":"2008","unstructured":"Wang, F., Agrawal, G., Jin, R.: Query planning for searching inter-dependent deep-web databases. In: Lud\u00e4scher, B., Mamoulis, N. (eds.) SSDBM 2008. LNCS, vol. 5069, pp. 24\u201341. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-69497-7_5"},{"issue":"3","key":"64_CR19","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/TCE.2009.5277999","volume":"55","author":"L Zhi","year":"2009","unstructured":"Zhi, L., Peiquan, J., Xuan, S., et al.: CCF-LRU: a new buffer replacement algorithm for flash memory. IEEE Trans. Consum. Electron. 55(3), 1351\u20131359 (2009)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"10","key":"64_CR20","doi-asserted-by":"publisher","first-page":"4676","DOI":"10.1016\/j.eswa.2015.01.011","volume":"42","author":"J Peiquan","year":"2015","unstructured":"Peiquan, J., Xike, X., Na, W., Lihua, Y.: Optimizing R-tree for flash memory. Expert Syst. Appl. 42(10), 4676\u20134686 (2015)","journal-title":"Expert Syst. Appl."},{"key":"64_CR21","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.datak.2011.09.007","volume":"72","author":"J Peiquan","year":"2012","unstructured":"Peiquan, J., Yi, O., Theo, H., Zhi, L.: AD-LRU: an efficient buffer replacement algorithm for flash-based databases. Data Knowl. Eng. 72, 83\u2013102 (2012)","journal-title":"Data Knowl. Eng."},{"key":"64_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-662-44917-2_10","volume-title":"Network and Parallel Computing","author":"K Chen","year":"2014","unstructured":"Chen, K., Jin, P., Yue, L.: A novel page replacement algorithm for the hybrid memory architecture involving PCM and DRAM. In: Hsu, C.-H., Shi, X., Salapura, V. (eds.) NPC 2014. LNCS, vol. 8707, pp. 108\u2013119. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44917-2_10"},{"key":"64_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-662-44917-2_8","volume-title":"Network and Parallel Computing","author":"Z Wu","year":"2014","unstructured":"Wu, Z., Jin, P., Yang, C., Yue, L.: APP-LRU: a new page replacement method for PCM\/DRAM-based hybrid memory systems. In: Hsu, C.-H., Shi, X., Salapura, V. (eds.) NPC 2014. LNCS, vol. 8707, pp. 84\u201395. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44917-2_8"},{"key":"64_CR24","doi-asserted-by":"crossref","unstructured":"Talati, N., Ali, A., et al.: Practical challenges in delivering the promises of real processing-in-memory machines. In: DATE, pp. 1628\u20131633 (2018)","DOI":"10.23919\/DATE.2018.8342275"},{"issue":"3","key":"64_CR25","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1145\/2872887.2750385","volume":"43","author":"Junwhan Ahn","year":"2015","unstructured":"Ahn, J., Yoo, S., Mutlu, O., et al.: PIM-enabled instructions: a low-overhead, locality-aware processing-in-memory architecture. In: ISCA, pp. 336\u2013348 (2015)","journal-title":"ACM SIGARCH Computer Architecture News"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29551-6_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T09:10:01Z","timestamp":1582362601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29551-6_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030295509","9783030295516"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29551-6_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ksem.conferences.academy\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"240","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"77","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}