{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:02:46Z","timestamp":1775638966527,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T00:00:00Z","timestamp":1494288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Science Foundation","award":["IIS-1452595"],"award-info":[{"award-number":["IIS-1452595"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,9]]},"DOI":"10.1145\/3035918.3064049","type":"proceedings-article","created":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T18:09:00Z","timestamp":1494439740000},"page":"715-730","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Access Path Selection in Main-Memory Optimized Data Systems"],"prefix":"10.1145","author":[{"given":"Michael S.","family":"Kester","sequence":"first","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]},{"given":"Manos","family":"Athanassoulis","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]},{"given":"Stratos","family":"Idreos","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2602024"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142548"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367892"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610502"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/567067.567085"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/645478.654822"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807224"},{"key":"e_1_3_2_1_9_1","volume-title":"EDBT","author":"Athanassoulis M.","year":"2016","unstructured":"M. Athanassoulis , M. S. Kester , L. M. Maas , R. Stoica , S. Idreos , A. Ailamaki , and M. Callaghan . Designing Access Methods: The RUM Conjecture . In EDBT , 2016 . M. Athanassoulis, M. S. Kester, L. M. Maas, R. Stoica, S. Idreos, A. Ailamaki, and M. Callaghan. Designing Access Methods: The RUM Conjecture. In EDBT, 2016."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915964"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/266800.266810"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"9","article-title":"Business Analytics in (a) Blink","volume":"35","author":"Barber R.","year":"2012","unstructured":"R. Barber , P. Bendel , M. Czech , O. Draese , F. Ho , N. Hrle , S. Idreos , M.-S. Kim , O. Koeth , J.-G. Lee , T. T. Li , G. M. Lohman , K. Morfonios , R. M\u00fcller , K. Murthy , I. Pandis , L. Qiao , V. Raman , R. Sidle , K. Stolze , and S. Szabo . Business Analytics in (a) Blink . IEEE DEBULL , 35 ( 1 ): 9 -- 14 , 2012 . R. Barber, P. Bendel, M. Czech, O. Draese, F. Ho, N. Hrle, S. Idreos, M.-S. Kim, O. Koeth, J.-G. Lee, T. T. Li, G. M. Lohman, K. Morfonios, R. M\u00fcller, K. Murthy, I. Pandis, L. Qiao, V. Raman, R. Sidle, K. Stolze, and S. Szabo. Business Analytics in (a) Blink. IEEE DEBULL, 35(1):9--14, 2012.","journal-title":"IEEE DEBULL"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113372"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559877"},{"key":"e_1_3_2_1_15_1","volume-title":"CIDR","author":"Boncz P.","year":"2005","unstructured":"P. Boncz , M. Zukowski , and N. J. Nes . MonetDB\/X100: Hyper-Pipelining Query Execution . In CIDR , 2005 . P. Boncz, M. Zukowski, and N. J. Nes. MonetDB\/X100: Hyper-Pipelining Query Execution. In CIDR, 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409360.1409380"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113294"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-011-0221-2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536258.2536260"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275492"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559955"},{"key":"e_1_3_2_1_22_1","volume-title":"VLDB","author":"Chaudhuri S.","year":"1997","unstructured":"S. Chaudhuri and V. R. Narasayya . An Efficient Cost-Driven Index Selection Tool for Microsoft SQL Server . In VLDB , 1997 . S. Chaudhuri and V. R. Narasayya. An Efficient Cost-Driven Index Selection Tool for Microsoft SQL Server. In VLDB, 1997."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/329.318578"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/971697.602261"},{"issue":"1","key":"e_1_3_2_1_25_1","first-page":"28","article-title":"The SAP HANA Database -- An Architecture Overview","volume":"35","author":"F\u00e4rber F.","year":"2012","unstructured":"F. F\u00e4rber , N. May , W. Lehner , P. Gro\u00dfe , I. M\u00fcller , H. Rauhe , and J. Dees . The SAP HANA Database -- An Architecture Overview . IEEE DEBULL , 35 ( 1 ): 28 -- 33 , 2012 . F. F\u00e4rber, N. May, W. Lehner, P. Gro\u00dfe, I. M\u00fcller, H. Rauhe, and J. Dees. The SAP HANA Database -- An Architecture Overview. IEEE DEBULL, 35(1):28--33, 2012.","journal-title":"IEEE DEBULL"},{"key":"e_1_3_2_1_26_1","volume-title":"IBM Redbooks","author":"Francisco P.","year":"2011","unstructured":"P. Francisco . The Netezza Data Appliance Architecture : A Platform for High Performance Data Warehousing and Analytics . IBM Redbooks , 2011 . P. Francisco. The Netezza Data Appliance Architecture: A Platform for High Performance Data Warehousing and Analytics. IBM Redbooks, 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/2168651.2168654"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732279.2732280"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363189.1363198"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000028"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOAC.1991.143840"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14778\/1921071.1921077"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066201"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807227"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516376"},{"issue":"1","key":"e_1_3_2_1_37_1","first-page":"40","volume":"35","author":"Idreos S.","year":"2012","unstructured":"S. Idreos , F. Groffen , N. Nes , S. Manegold , K. S. Mullender , and M. L. Kersten . MonetDB: Two Decades of Research in Column-oriented Database Architectures. IEEE DEBULL , 35 ( 1 ): 40 -- 45 , 2012 . S. Idreos, F. Groffen, N. Nes, S. Manegold, K. S. Mullender, and M. L. Kersten. MonetDB: Two Decades of Research in Column-oriented Database Architectures. IEEE DEBULL, 35(1):40--45, 2012.","journal-title":"IEEE DEBULL"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559878"},{"key":"e_1_3_2_1_39_1","unstructured":"Intel. Online reference. https:\/\/software.intel.com\/en-us\/articles\/intelr-memory-latency-checker.  Intel. Online reference. https:\/\/software.intel.com\/en-us\/articles\/intelr-memory-latency-checker."},{"key":"e_1_3_2_1_40_1","volume-title":"BTW","author":"J\u00e4kel T.","year":"2013","unstructured":"T. J\u00e4kel , H. Voigt , T. Kissinger , and W. Lehner . Pack Indexing for Time-Constrained In-Memory Query Processing . In BTW , 2013 . T. J\u00e4kel, H. Voigt, T. Kissinger, and W. Lehner. Pack Indexing for Time-Constrained In-Memory Query Processing. In BTW, 2013."},{"key":"e_1_3_2_1_41_1","volume-title":"VLDB","author":"Johnson R.","year":"2007","unstructured":"R. Johnson , S. Harizopoulos , N. Hardavellas , K. Sabirli , I. Pandis , A. Ailamaki , N. G. Mancheril , and B. Falsafi . To Share or Not to Share ? In VLDB , 2007 . R. Johnson, S. Harizopoulos, N. Hardavellas, K. Sabirli, I. Pandis, A. Ailamaki, N. G. Mancheril, and B. Falsafi. To Share or Not to Share? In VLDB, 2007."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453925"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767867"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/645472.655555"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807206"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2236584.2236587"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14778\/2047485.2047491"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113373"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367518"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113371"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610507"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544812"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544834"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737787"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465322"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287387"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168855"},{"key":"e_1_3_2_1_58_1","volume-title":"VLDB","author":"Moerkotte G.","year":"1998","unstructured":"G. Moerkotte . Small Materialized Aggregates : A Light Weight Index Structure for Data Warehousing . In VLDB , 1998 . G. Moerkotte. Small Materialized Aggregates: A Light Weight Index Structure for Data Warehousing. In VLDB, 1998."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14778\/2002938.2002940"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2747645"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610522"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536360.2536364"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453924"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536233"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335449"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452402"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367514"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335419"},{"key":"e_1_3_2_1_69_1","volume-title":"TDWI Best Practices Report","author":"Russom P.","year":"2012","unstructured":"P. Russom . High-Performance Data Warehousing . TDWI Best Practices Report , 2012 . P. Russom. High-Performance Data Warehousing. TDWI Best Practices Report, 2012."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/582095.582099"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/42201.42203"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.54724"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2803140.2803148"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882918"},{"key":"e_1_3_2_1_75_1","volume-title":"IMDM","author":"Shamgunov. The N.","year":"2014","unstructured":"N. Shamgunov. The Mem SQL In-Memory Database System. In IMDM , 2014 . N. Shamgunov. The MemSQL In-Memory Database System. In IMDM, 2014."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465306"},{"key":"e_1_3_2_1_77_1","volume-title":"VLDB","author":"Stonebraker M.","year":"2005","unstructured":"M. Stonebraker , D. J. Abadi , A. Batkin , X. Chen , M. Cherniack , M. Ferreira , E. Lau , A. Lin , S. R. Madden , E. J. O'Neil , P. E. O'Neil , A. Rasin , N. Tran , and S. Zdonik . C-Store: A Column-oriented DBMS . In VLDB , 2005 . M. Stonebraker, D. J. Abadi, A. Batkin, X. Chen, M. Cherniack, M. Ferreira, E. Lau, A. Lin, S. R. Madden, E. J. O'Neil, P. E. O'Neil, A. Rasin, N. Tran, and S. Zdonik. C-Store: A Column-oriented DBMS. In VLDB, 2005."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610515"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816727"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687707"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687671"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465288"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915222"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564709"},{"issue":"1","key":"e_1_3_2_1_85_1","first-page":"21","article-title":"Vectorwise","volume":"35","author":"Zukowski M.","year":"2012","unstructured":"M. Zukowski and P. Boncz . Vectorwise : Beyond Column Stores. IEEE DEBULL , 35 ( 1 ): 21 -- 27 , 2012 . M. Zukowski and P. Boncz. Vectorwise: Beyond Column Stores. IEEE DEBULL, 35(1):21--27, 2012.","journal-title":"Beyond Column Stores. IEEE DEBULL"},{"issue":"2","key":"e_1_3_2_1_86_1","first-page":"17","article-title":"MonetDB\/X100 - A DBMS","volume":"28","author":"Zukowski M.","year":"2005","unstructured":"M. Zukowski , P. A. Boncz , and S. H\u00e9man . MonetDB\/X100 - A DBMS In The CPU Cache. IEEE DEBULL , 28 ( 2 ): 17 -- 22 , 2005 . M. Zukowski, P. A. Boncz, and S. H\u00e9man. MonetDB\/X100 - A DBMS In The CPU Cache. IEEE DEBULL, 28(2):17--22, 2005.","journal-title":"The CPU Cache. IEEE DEBULL"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140402.1140410"},{"key":"e_1_3_2_1_88_1","volume-title":"VLDB","author":"Zukowski M.","year":"2007","unstructured":"M. Zukowski , S. H\u00e9man , N. J. Nes , and P. Boncz . Cooperative Scans: Dynamic Bandwidth Sharing in a DBMS . In VLDB , 2007 . M. Zukowski, S. H\u00e9man, N. J. Nes, and P. Boncz. Cooperative Scans: Dynamic Bandwidth Sharing in a DBMS. In VLDB, 2007."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1457150.1457160"}],"event":{"name":"SIGMOD\/PODS'17: International Conference on Management of Data","location":"Chicago Illinois USA","acronym":"SIGMOD\/PODS'17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2017 ACM International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3064049","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3035918.3064049","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3035918.3064049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:42Z","timestamp":1750217802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3064049"}},"subtitle":["Should I Scan or Should I Probe?"],"short-title":[],"issued":{"date-parts":[[2017,5,9]]},"references-count":87,"alternative-id":["10.1145\/3035918.3064049","10.1145\/3035918"],"URL":"https:\/\/doi.org\/10.1145\/3035918.3064049","relation":{},"subject":[],"published":{"date-parts":[[2017,5,9]]},"assertion":[{"value":"2017-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}