Sciweavers

3305 search results - page 36 / 661
» Can we Rely on SQL
Sort
View
ICEIS
2002
IEEE
14 years 16 days ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
CIDR
2009
145views Algorithms» more  CIDR 2009»
13 years 8 months ago
Continuous Analytics: Rethinking Query Processing in a Network-Effect World
Modern data analysis applications driven by the Network Effect are pushing traditional database and data warehousing technologies beyond their limits due to their massively increa...
Michael J. Franklin, Sailesh Krishnamurthy, Neil C...
IWPC
2006
IEEE
14 years 1 months ago
Studying the Evolution of Software Systems Using Change Clusters
In this paper, we present an approach that examines the evolution of code stored in source control repositories. The technique identifies Change Clusters, which can help managers...
Jay Kothari, Ali Shokoufandeh, Spiros Mancoridis, ...
ICDE
2010
IEEE
221views Database» more  ICDE 2010»
13 years 7 months ago
A generic auto-provisioning framework for cloud databases
— We discuss the problem of resource provisioning for database management systems operating on top of an Infrastructure-As-A-Service (IaaS) cloud. To solve this problem, we descr...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
VLDB
2004
ACM
102views Database» more  VLDB 2004»
14 years 28 days ago
PIVOT and UNPIVOT: Optimization and Execution Strategies in an RDBMS
PIVOT and UNPIVOT, two operators on tabular data that exchange rows and columns, enable data transformations useful in data modeling, data analysis, and data presentation. They ca...
Conor Cunningham, Goetz Graefe, César A. Ga...