Sciweavers

1830 search results - page 104 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
1998
ACM
145views Database» more  SIGMOD 1998»
14 years 2 months ago
AutoAdmin 'What-if' Index Analysis Utility
As databases get widely deployed, it becomes increasingly important to reduce the overhead of database administration. An important aspect of data administration that critically i...
Surajit Chaudhuri, Vivek R. Narasayya
VLDB
1992
ACM
122views Database» more  VLDB 1992»
14 years 2 months ago
Using Flexible Transactions to Support Multi-System Telecommunication Applications
Service order provisioning is an important telecommunication application that automates the process of providing telephone services in response to the customer requests. It is an ...
Mansoor Ansari, Linda Ness, Marek Rusinkiewicz, Am...
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
13 years 2 months ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
DLOG
1997
13 years 11 months ago
Experiments with the DFL Hybrid System
Abstract. In this short paper we describe the DFL hybrid knowledge base, that integrates descriptions with expressive object-oriented rules. The knowledge base manages a database o...
Mira Balaban, Adi Eyal
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
14 years 1 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa