Common Sub-Expression Identification Strategy for MQO
In query optimization, a query can be executed with different strategies, known as execution plan. The query optimizer will determine the best execution plan for a single query. However, when there are more than one query to be executed together, the locally optimal strategies for single queries may...
| Main Authors: | Zakaria, Nor Hawaniah, Sahibuddin, Shamsul, Selamat, Harihodin |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3344/ http://eprints.utm.my/3344/1/COMMON_SUB-EXPRESSION_IDENTIFICATION.pdf |
Similar Items
On-line analytical processing tools for land revenue management system
by: Sahibuddin, Shamsul, et al.
Published: (2000)
by: Sahibuddin, Shamsul, et al.
Published: (2000)
A universal relation approach for natural query in logic database system
by: Selamat, Harihodin
Published: (1992)
by: Selamat, Harihodin
Published: (1992)
The integration of spatial and non-spatial data model
by: Daman, Daut, et al.
Published: (2000)
by: Daman, Daut, et al.
Published: (2000)
Knowledge management system architecture for organizational learning with collaborative environment
by: Abdullah, Rusli, et al.
Published: (2006)
by: Abdullah, Rusli, et al.
Published: (2006)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
Electronic dictionary production system (EDIPS)
by: Harihodin, Hezul Hezry
Published: (2006)
by: Harihodin, Hezul Hezry
Published: (2006)
Teknik pengoptimuman jadual gabungan kesamaan bagi data bersandarkan masa
by: Kurmin, Norazrin, et al.
Published: (2005)
by: Kurmin, Norazrin, et al.
Published: (2005)
Adoption Issues in DevOps from the Perspective of Continuous Delivery Pipeline
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2019)
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2019)
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
Knowledge management system architecture for organizational learning with collaborative environment
by: Abdullah, Rusli, et al.
Published: (2005)
by: Abdullah, Rusli, et al.
Published: (2005)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal
by: Al-Khayyat, Kamal, et al.
Published: (2018)
by: Al-Khayyat, Kamal, et al.
Published: (2018)
Five hundred most-cited papers in the computer sciences: Trends, relationships and common factors
by: Teh, Phoey Lee *, et al.
Published: (2021)
by: Teh, Phoey Lee *, et al.
Published: (2021)
A neural network model for the common due date job scheduling on unrelated parallel machines
by: Hamad, S, et al.
Published: (2003)
by: Hamad, S, et al.
Published: (2003)
Conceptual Design Of Biodiversity Data Model (BiDaM) Using
Object Relational And Event Based Approach
by: Kamruzzaman, A. Z. M., et al.
Published: (2005)
by: Kamruzzaman, A. Z. M., et al.
Published: (2005)
Comparative analysis of machine learning models to predict common vulnerabilities and exposure
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
Arithmetic expressions and data types in C++
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Integration of median filter and oriented field estimation for fingerprint identification system
by: Nor'Aqilah, Misman
Published: (2015)
by: Nor'Aqilah, Misman
Published: (2015)
K-Means approach to facial expressions recognition
by: Zeki, Ahmed M., et al.
Published: (2012)
by: Zeki, Ahmed M., et al.
Published: (2012)
Current trends strategies in the test redundancy reduction
by: Norasyikin, Safieny, et al.
Published: (2016)
by: Norasyikin, Safieny, et al.
Published: (2016)
Understanding the behavioral intention to use SaaS ERP sub-modules considering perceived enjoyment, perceived anxiety and perceived system performance
by: Yap, Mun Keong *, et al.
Published: (2020)
by: Yap, Mun Keong *, et al.
Published: (2020)
An equijoin-optimization technique for Malaysian Hydrological Information System (MHIS) data
by: Kurmin, Norazrin, et al.
Published: (2005)
by: Kurmin, Norazrin, et al.
Published: (2005)
Pengintegrasian data extensible markup language (XML) ke dalam pangkalan data hubungan menggunakan common warehouse metamodel (CWM)
by: Mohd. Nasir, Wan Mohd. Haffiz
Published: (2007)
by: Mohd. Nasir, Wan Mohd. Haffiz
Published: (2007)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Md Nor, Norzaliza, et al.
Published: (2010)
by: Md Nor, Norzaliza, et al.
Published: (2010)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Fuzzy computing with expressions for evaluating fonts styles on children websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Effective gene selection techniques for classification of gene expression data
by: Yeo, Lee Chin
Published: (2005)
by: Yeo, Lee Chin
Published: (2005)
Hybrid Migrating Birds Optimization Strategy for t-way Test Suite Generation
by: Hasneeza, L. Zakaria, et al.
Published: (2019)
by: Hasneeza, L. Zakaria, et al.
Published: (2019)
Online express bus ticket system / Nor Hidayah Zamberi
by: Nor Hidayah, Zamberi
Published: (2003)
by: Nor Hidayah, Zamberi
Published: (2003)
An approach of bio-inspired generalized shape for writer identification
by: Muda , Azah Kamilah, et al.
Published: (2006)
by: Muda , Azah Kamilah, et al.
Published: (2006)
A Better Way for Exon Identification in DNA Splicing
by: Ahmad, Muneer, et al.
Published: (2010)
by: Ahmad, Muneer, et al.
Published: (2010)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
A framework of artificial immune system in writer identification
by: Muda, Azah Kamilah, et al.
Published: (2005)
by: Muda, Azah Kamilah, et al.
Published: (2005)
A conceptual security sub-model for enhancing human-agent collaboration based on generic nodal approach
by: Abbas Mohammed, Khudhair, et al.
Published: (2017)
by: Abbas Mohammed, Khudhair, et al.
Published: (2017)
Hla Polymorphism In Malay Sub-Ethnic Groups In Peninsular Malaysia.
by: Atan, Edinur Hisham
Published: (2009)
by: Atan, Edinur Hisham
Published: (2009)
A Novel Optimized Approach for Gene Identification in DNA Sequences
by: Ahmad, Muneer, et al.
Published: (2011)
by: Ahmad, Muneer, et al.
Published: (2011)
Bimodal person identification system based on speech and signature recognition's
by: Gunawan, Teddy Surya
Published: (2013)
by: Gunawan, Teddy Surya
Published: (2013)
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
by: Z. L., Chuan, et al.
Published: (2017)
by: Z. L., Chuan, et al.
Published: (2017)
Similar Items
-
On-line analytical processing tools for land revenue management system
by: Sahibuddin, Shamsul, et al.
Published: (2000) -
A universal relation approach for natural query in logic database system
by: Selamat, Harihodin
Published: (1992) -
The integration of spatial and non-spatial data model
by: Daman, Daut, et al.
Published: (2000) -
Knowledge management system architecture for organizational learning with collaborative environment
by: Abdullah, Rusli, et al.
Published: (2006) -
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)