26 | -- | 0 | Christian S. Jensen. Foreword to Invited Articles Issue |
27 | -- | 0 | Xiaocheng Hu, Yufei Tao, Chin-Wan Chung. I/O-Efficient Algorithms on Triangle Listing and Counting |
28 | -- | 0 | Marcelo Arenas, Jonny Daenen, Frank Neven, Martin Ugarte, Jan Van den Bussche, Stijn Vansummeren. Discovering XSD Keys from XML Data |
29 | -- | 0 | Hyungsoo Jung, Hyuck Han, Alan Fekete, Gernot Heiser, Heon Young Yeom. A Scalable Lock Manager for Multicores |
30 | -- | 0 | Stavros Papadopoulos, Graham Cormode, Antonios Deligiannakis, Minos N. Garofalakis. Lightweight Query Authentication on Streams |
31 | -- | 0 | Amélie Gheerbrant, Leonid Libkin, Cristina Sirangelo. Naïve Evaluation of Queries over Incomplete Databases |
32 | -- | 0 | Benny Kimelfeld, Phokion G. Kolaitis. The Complexity of Mining Maximal Frequent Subgraphs |
33 | -- | 0 | Meghyn Bienvenu, Balder ten Cate, Carsten Lutz, Frank Wolter. Ontology-Based Data Access: A Study through Disjunctive Datalog, CSP, and MMSNP |
34 | -- | 0 | Chao Li, Daniel Yang Li, Gerome Miklau, Dan Suciu. A Theory of Pricing Private Data |
35 | -- | 0 | Susan B. Davidson, Sanjeev Khanna, Tova Milo, Sudeepa Roy. Top-k and Clustering with Noisy Comparisons |