default search action
Rimma V. Nehme
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j7]Jiexing Li, Jeffrey F. Naughton, Rimma V. Nehme:
Resource bricolage and resource selection for parallel database systems. VLDB J. 26(1): 31-54 (2017) - 2016
- [j6]Jiexing Li, Jeffrey F. Naughton, Rimma V. Nehme:
Resource Bricolage for Parallel DBMSs on Heterogeneous Clusters. SIGMOD Rec. 45(1): 42-49 (2016) - [c22]Kukjin Lee, Arnd Christian König, Vivek R. Narasayya, Bolin Ding, Surajit Chaudhuri, Brent Ellwein, Alexey Eksarevskiy, Manbeen Kohli, Jacob Wyant, Praneeta Prakash, Rimma V. Nehme, Jiexing Li, Jeffrey F. Naughton:
Operator and Query Progress Estimation in Microsoft SQL Server Live Query Statistics. SIGMOD Conference 2016: 1753-1764 - 2015
- [c21]Willis Lang, Rimma V. Nehme, Ian Rae:
Database Optimization in the Cloud: Where Costs, Partial Results, and Consumer Choice Meet. CIDR 2015 - 2014
- [j5]Jiexing Li, Jeffrey F. Naughton, Rimma V. Nehme:
Resource Bricolage for Parallel Database Systems. Proc. VLDB Endow. 8(1): 25-36 (2014) - [c20]Willis Lang, Rimma V. Nehme, Eric Robinson, Jeffrey F. Naughton:
Partial results in database systems. SIGMOD Conference 2014: 1275-1286 - 2013
- [j4]Rimma V. Nehme, Karen Works, Chuan Lei, Elke A. Rundensteiner, Elisa Bertino:
Multi-route query processing and optimization. J. Comput. Syst. Sci. 79(3): 312-329 (2013) - [c19]Jiexing Li, Rimma V. Nehme, Jeffrey F. Naughton:
Toward Progress Indicators on Steroids for Big Data Systems. CIDR 2013 - [c18]Rimma V. Nehme:
Unlocking Cool in Databases (and CS in general). CIDR 2013 - [c17]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:
FENCE: continuous access control enforcement in dynamic data stream environments. CODASPY 2013: 243-254 - [c16]David J. DeWitt, Alan Halverson, Rimma V. Nehme, Srinath Shankar, Josep Aguilar-Saborit, Artin Avanes, Miro Flasza, Jim Gramling:
Split query processing in polybase. SIGMOD Conference 2013: 1255-1266 - 2012
- [c15]Jiexing Li, Rimma V. Nehme, Jeffrey F. Naughton:
GSLPI: A Cost-Based Query Progress Indicator. ICDE 2012: 678-689 - [c14]Srinath Shankar, Rimma V. Nehme, Josep Aguilar-Saborit, Andrew Chung, Mostafa Elhemali, Alan Halverson, Eric Robinson, Mahadevan Sankara Subramanian, David J. DeWitt, César A. Galindo-Legaria:
Query optimization in microsoft SQL server PDW. SIGMOD Conference 2012: 767-776 - 2011
- [c13]Rimma V. Nehme, Nicolas Bruno:
Automated partitioning design in parallel database systems. SIGMOD Conference 2011: 1137-1148 - 2010
- [c12]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:
FENCE: Continuous access control enforcement in dynamic data stream environments. ICDE 2010: 940-943 - [c11]Nicolas Bruno, Rimma V. Nehme:
Mini-Me: A min-repro system for database software. ICDE 2010: 1153-1156
2000 – 2009
- 2009
- [b1]Rimma V. Nehme:
Efficient query processing for rich and diverse real-time data. Purdue University, USA, 2009 - [j3]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino:
Tagging Stream Data for Rich Real-Time Services. Proc. VLDB Endow. 2(1): 73-84 (2009) - [j2]Rimma V. Nehme, Karen Works, Elke A. Rundensteiner, Elisa Bertino:
Query Mesh: Multi-Route Query Processing Technology. Proc. VLDB Endow. 2(2): 1530-1533 (2009) - [c10]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino:
Self-tuning query mesh for adaptive multi-route query processing. EDBT 2009: 803-814 - [c9]Nicolas Bruno, Rimma V. Nehme:
Finding min-repros in database software. DBTest 2009 - [c8]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino, Elke A. Rundensteiner:
StreamShield: a stream-centric approach towards security and privacy in data stream environments. SIGMOD Conference 2009: 1027-1030 - 2008
- [j1]David B. Lomet, Mingsheng Hong, Rimma V. Nehme, Rui Zhang:
Transaction time indexing with version compression. Proc. VLDB Endow. 1(1): 870-881 (2008) - [c7]Rimma V. Nehme:
Database, heal thyself. ICDE Workshops 2008: 4-10 - [c6]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino:
A Security Punctuation Framework for Enforcing Access Control on Streaming Data. ICDE 2008: 406-415 - [c5]Ashish Kamra, Elisa Bertino, Rimma V. Nehme:
Responding to Anomalous Database Requests. Secure Data Management 2008: 50-66 - [c4]Nicolas Bruno, Rimma V. Nehme:
Configuration-parametric query optimization for physical design tuning. SIGMOD Conference 2008: 941-952 - 2007
- [c3]Rimma V. Nehme, Elke A. Rundensteiner:
ClusterSheddy : Load Shedding Using Moving Clusters over Spatio-temporal Data Streams. DASFAA 2007: 637-651 - [c2]Ross Maciejewski, Benjamin Tyner, Yun Jang, Cheng Zheng, Rimma V. Nehme, David S. Ebert, William S. Cleveland, Mourad Ouzzani, Shaun J. Grannis, Lawrence T. Glickman:
LAHVA: Linked Animal-Human Health Visual Analytics. IEEE VAST 2007: 27-34 - 2006
- [c1]Rimma V. Nehme, Elke A. Rundensteiner:
SCUBA: Scalable Cluster-Based Algorithm for Evaluating Continuous Spatio-temporal Queries on Moving Objects. EDBT 2006: 1001-1019
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint