The dangers of replication and a solution J Gray, P Helland, P O'Neil, D Shasha Proceedings of the 1996 ACM SIGMOD international Conference on Management of …, 1996 | 1756 | 1996 |
Simple fast algorithms for the editing distance between trees and related problems K Zhang, D Shasha SIAM journal on computing 18 (6), 1245-1262, 1989 | 1610 | 1989 |
A gene expression map of the Arabidopsis root K Birnbaum, DE Shasha, JY Wang, JW Jung, GM Lambert, DW Galbraith, ... Science 302 (5652), 1956-1960, 2003 | 1273 | 2003 |
Statstream: Statistical monitoring of thousands of data streams in real time Y Zhu, D Shasha VLDB'02: Proceedings of the 28th International Conference on Very Large …, 2002 | 935 | 2002 |
2Q: a low overhead high performance bu er management replacement algorithm T Johnson, D Shasha Proceedings of the 20th International Conference on Very Large Data Bases …, 1994 | 920 | 1994 |
Filtering algorithms and implementation for very fast publish/subscribe systems F Fabret, HA Jacobsen, F Llirbat, J Pereira, KA Ross, D Shasha Proceedings of the 2001 ACM SIGMOD international conference on Management of …, 2001 | 714 | 2001 |
Algorithmics and applications of tree and graph searching D Shasha, JTL Wang, R Giugno Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on …, 2002 | 580 | 2002 |
Secure Untrusted Data Repository (SUNDR). J Li, MN Krohn, D Mazieres, DE Shasha Osdi 4, 9-9, 2004 | 564 | 2004 |
Declarative data cleaning: Language, model, and algorithms H Galhardas, D Florescu, D Shasha, E Simon, C Saita INRIA, 2001 | 504 | 2001 |
Efficient and correct execution of parallel programs that share memory D Shasha, M Snir ACM Transactions on Programming Languages and Systems (TOPLAS) 10 (2), 282-312, 1988 | 459 | 1988 |
On the editing distance between unordered labeled trees K Zhang, R Statman, D Shasha Information processing letters 42 (3), 133-139, 1992 | 455 | 1992 |
Making snapshot isolation serializable A Fekete, D Liarokapis, E O'Neil, P O'Neil, D Shasha ACM Transactions on Database Systems (TODS) 30 (2), 492-528, 2005 | 389 | 2005 |
Efficient elastic burst detection in data streams Y Zhu, D Shasha Proceedings of the ninth ACM SIGKDD international conference on Knowledge …, 2003 | 389 | 2003 |
Warping indexes with envelope transforms for query by humming Y Zhu, D Shasha Proceedings of the 2003 ACM SIGMOD international conference on Management of …, 2003 | 377 | 2003 |
Methods and apparatus for protecting information MO Rabin, DE Shasha US Patent 6,697,948, 2004 | 368 | 2004 |
Skip-over: Algorithms and complexity for overloaded systems that allow skips G Koren, D Shasha Proceedings 16th IEEE Real-Time Systems Symposium, 110-117, 1995 | 333 | 1995 |
Graphgrep: A fast and universal method for querying graphs R Giugno, D Shasha Object recognition supported by user interaction for service robots 2, 112-115, 2002 | 314 | 2002 |
Database tuning: principles, experiments, and troubleshooting techniques D Shasha, P Bonnet Elsevier, 2002 | 314* | 2002 |
AJAX: An extensible data cleaning tool H Galhardas, D Florescu, D Shasha, E Simon ACM Sigmod Record 29 (2), 590, 2000 | 295 | 2000 |
On the competitiveness of on-line real-time task scheduling S Baruah, G Koren, D Mao, B Mishra, A Raghunathan, L Rosier, ... Real-Time Systems 4 (2), 125-144, 1992 | 293 | 1992 |