Sciweavers

5221 search results - page 37 / 1045
» An On-line Problem Database
Sort
View
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 9 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
ICDT
2012
ACM
251views Database» more  ICDT 2012»
11 years 11 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
DEXA
2004
Springer
96views Database» more  DEXA 2004»
14 years 2 months ago
A Selective Key-Oriented XML Index for the Index Selection Problem in XDBMS
Abstract. In relational database management systems indexes are used to accelerate specific queries. The selection of indexes is an important task when tuning a database which is ...
Beda Christoph Hammerschmidt, Martin Kempa, Volker...
ICDE
2007
IEEE
108views Database» more  ICDE 2007»
14 years 26 days ago
Problem definition for effective workload management
The paper introduces the problem of designing dynamic workload management (WM) tools that are aware of the diversity of classes of users and their diverse access patterns. Our app...
Adrian M. Teisanu, Sam Lightstone, Mariano P. Cons...
ICDE
2004
IEEE
85views Database» more  ICDE 2004»
14 years 10 months ago
Selectivity Estimation for String Predicates: Overcoming the Underestimation Problem
Queries with (equality or LIKE) selection predicates over string attributes are widely used in relational databases. However, state-of-the-art techniques for estimating selectivit...
Surajit Chaudhuri, Venkatesh Ganti, Luis Gravano