Sciweavers

19776 search results - page 174 / 3956
» Architecture of a Database System
Sort
View
ICEIS
2002
IEEE
14 years 2 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
IDEAS
1997
IEEE
107views Database» more  IDEAS 1997»
14 years 1 months ago
Query Processing in the ROL system
The ROL system is a novel deductive object-oriented database system that has been implemented at the University of Regina. It provides a uniform rule-based declarative language fo...
Mengchi Liu, Weidong Yu
HT
1993
ACM
14 years 1 months ago
Concurrency Control in Collaborative Hypertext Systems
Traditional concurrency control techniques for database systems (transaction management based on locking protocols) have been successful in many multiuser settings, but these tech...
Uffe Kock Wiil, John J. Leggett
SIGMOD
1992
ACM
111views Database» more  SIGMOD 1992»
14 years 1 months ago
Performance Evaluation of Extended Storage Architectures for Transaction Processing
: The use of non-volatile semiconductor memory within an extended storage hierarchy promises significant performance improvements for transaction processing. Although page-addressa...
Erhard Rahm
ICSE
2003
IEEE-ACM
14 years 9 months ago
Stemming Architectural Erosion by Coupling Architectural Discovery and Recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Alexander Egyed, Nenad Medvidovic, Paul Grünb...