{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T05:28:31Z","timestamp":1768109311583,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T00:00:00Z","timestamp":1432684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Grants Council of Hong Kong","award":["GRF PolyU 520413 521012 and GRF HKU 712712E"],"award-info":[{"award-number":["GRF PolyU 520413 521012 and GRF HKU 712712E"]}]},{"name":"Microsoft Hong Kong","award":["research gift"],"award-info":[{"award-number":["research gift"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,27]]},"DOI":"10.1145\/2723372.2747642","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"31-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["ByteSlice"],"prefix":"10.1145","author":[{"given":"Ziqiang","family":"Feng","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"given":"Eric","family":"Lo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"given":"Ben","family":"Kao","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Wenjian","family":"Xu","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Oracle Exalytics In-memory Machine. http:\/\/www.oracle.com\/us\/solutions\/ent-performance-bi\/business-intelligence\/exalytics-bi-machine\/overview\/index.html.  Oracle Exalytics In-memory Machine. http:\/\/www.oracle.com\/us\/solutions\/ent-performance-bi\/business-intelligence\/exalytics-bi-machine\/overview\/index.html."},{"key":"e_1_3_2_1_2_1","volume-title":"VLDB","author":"Ailamaki A.","year":"2001","unstructured":"A. Ailamaki , D. J. DeWitt , M. D. Hill , and M. Skounakis . Weaving relations for cache performance . In VLDB , 2001 . A. Ailamaki, D. J. DeWitt, M. D. Hill, and M. Skounakis. Weaving relations for cache performance. In VLDB, 2001."},{"key":"e_1_3_2_1_3_1","volume-title":"UCI machine learning repository","author":"Bache K.","year":"2013","unstructured":"K. Bache and M. Lichman . UCI machine learning repository , 2013 . http:\/\/archive.ics.uci.edu\/ml. K. Bache and M. Lichman. UCI machine learning repository, 2013. http:\/\/archive.ics.uci.edu\/ml."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732219.2732227"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544839"},{"key":"e_1_3_2_1_6_1","volume-title":"Business analytics in (a) blink","author":"Barber R.","year":"2012","unstructured":"R. Barber , P. Bendel , M. Czech , O. Draese , F. Ho , N. Hrle , S. Idreos , M.-S. Kim , O. Koeth , J.-G. Lee , Business analytics in (a) blink . IEEE Data Eng. Bull ., 2012 . R. Barber, P. Bendel, M. Czech, O. Draese, F. Ho, N. Hrle, S. Idreos, M.-S. Kim, O. Koeth, J.-G. Lee, et al. Business analytics in (a) blink. IEEE Data Eng. Bull., 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559877"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989328"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523626"},{"key":"e_1_3_2_1_10_1","volume-title":"CIDR","author":"Boncz P. A.","year":"2005","unstructured":"P. A. Boncz , M. Zukowski , and N. Nes . MonetDB\/X100: Hyper-Pipelining Query Execution . In CIDR , 2005 . P. A. Boncz, M. Zukowski, and N. Nes. MonetDB\/X100: Hyper-Pipelining Query Execution. In CIDR, 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"Program for TPC-D data generation with skew","author":"Chaudhuri S.","year":"2012","unstructured":"S. Chaudhuri and V. Narasayya . Program for TPC-D data generation with skew , 2012 . S. Chaudhuri and V. Narasayya. Program for TPC-D data generation with skew, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454171"},{"key":"e_1_3_2_1_13_1","volume-title":"PVLDB","author":"Cieslewicz J.","year":"2007","unstructured":"J. Cieslewicz and K. A. Ross . Adaptive aggregation on chip multiprocessors . In PVLDB , 2007 . J. Cieslewicz and K. A. Ross. Adaptive aggregation on chip multiprocessors. In PVLDB, 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920927"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Data Eng. Bull.","author":"F\u00e4rber F.","year":"2012","unstructured":"F. F\u00e4rber , N. May , W. Lehner , P. Gro\u00dfe , I. M\u00fcller , H. Rauhe , and J. Dees . The SAP HANA Database--An Architecture Overview . IEEE Data Eng. Bull. , 2012 . F. F\u00e4rber, N. May, W. Lehner, P. Gro\u00dfe, I. M\u00fcller, H. Rauhe, and J. Dees. The SAP HANA Database--An Architecture Overview. IEEE Data Eng. Bull., 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113292"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. Supersonic library. https:\/\/code.google.com\/p\/supersonic\/.  Google. Supersonic library. https:\/\/code.google.com\/p\/supersonic\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/1921071.1921077"},{"key":"e_1_3_2_1_19_1","volume-title":"VLDB","author":"Hankins R. A.","year":"2003","unstructured":"R. A. Hankins and J. M. Patel . Data morphing: an adaptive, cache-conscious storage technique . In VLDB , 2003 . R. A. Hankins and J. M. Patel. Data morphing: an adaptive, cache-conscious storage technique. In VLDB, 2003."},{"key":"e_1_3_2_1_20_1","volume-title":"Monetdb: Two decades of research in column-oriented database architectures","author":"Idreos S.","year":"2012","unstructured":"S. Idreos , F. Groffen , N. Nes , S. Manegold , K. S. Mullender , and M. Kersten . Monetdb: Two decades of research in column-oriented database architectures . IEEE Data Eng. Bull ., 2012 . S. Idreos, F. Groffen, N. Nes, S. Manegold, K. S. Mullender, and M. Kersten. Monetdb: Two decades of research in column-oriented database architectures. IEEE Data Eng. Bull., 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2007.12"},{"key":"e_1_3_2_1_22_1","unstructured":"Intel. Intel Performance Counter Monitor. https:\/\/software.intel.com\/en-us\/articles\/intel-performance-counter-monitor\/.  Intel. Intel Performance Counter Monitor. https:\/\/software.intel.com\/en-us\/articles\/intel-performance-counter-monitor\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Intel architecture instruction set extentions programming reference","year":"2013","unstructured":"Intel. Intel architecture instruction set extentions programming reference , 2013 . Intel. Intel architecture instruction set extentions programming reference, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732986"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767867"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687564"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732959"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2047485.2047491"},{"key":"e_1_3_2_1_29_1","unstructured":"S. Lahman. Baseball database. http:\/\/www.seanlahman.com\/baseball-archive\/statistics\/.  S. Lahman. Baseball database. http:\/\/www.seanlahman.com\/baseball-archive\/statistics\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367518"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465322"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732965"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/253262.253268"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610522"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1399504.1360617"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/568271.223801"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0349-3"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033408.2033427"},{"key":"e_1_3_2_1_39_1","volume-title":"ADMS Workshop","author":"Willhalm T.","year":"2013","unstructured":"T. Willhalm , I. Oukid , I. M\u00fcller , and F. Faerber . Vectorizing database column scans with complex predicates . In ADMS Workshop , 2013 . T. Willhalm, I. Oukid, I. M\u00fcller, and F. Faerber. Vectorizing database column scans with complex predicates. In ADMS Workshop, 2013."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687671"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995441.1995442"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564709"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.148"}],"event":{"name":"SIGMOD\/PODS'15: International Conference on Management of Data","location":"Melbourne Victoria Australia","acronym":"SIGMOD\/PODS'15","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2723372.2747642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2723372.2747642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:38Z","timestamp":1750227398000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2723372.2747642"}},"subtitle":["Pushing the Envelop of Main Memory Data Processing with a New Storage Layout"],"short-title":[],"issued":{"date-parts":[[2015,5,27]]},"references-count":43,"alternative-id":["10.1145\/2723372.2747642","10.1145\/2723372"],"URL":"https:\/\/doi.org\/10.1145\/2723372.2747642","relation":{},"subject":[],"published":{"date-parts":[[2015,5,27]]},"assertion":[{"value":"2015-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}