Sciweavers

1830 search results - page 119 / 366
» Implementing a Tamper-Evident Database System
Sort
View
VLDB
2007
ACM
110views Database» more  VLDB 2007»
14 years 4 months ago
GeRoMeSuite: A System for Holistic Generic Model Management
Manipulation of models and mappings is a common task in the design and development of information systems. Research in Model Management aims at supporting these tasks by providing...
David Kensche, Christoph Quix, Xiang Li 0002, Yong...
SIGMOD
2003
ACM
163views Database» more  SIGMOD 2003»
14 years 10 months ago
Multi-Dimensional Clustering: A New Data Layout Scheme in DB2
We describe the design and implementation of a new data layout scheme, called multi-dimensional clustering, in DB2 Universal Database Version 8. Many applications, e.g., OLAP and ...
Sriram Padmanabhan, Bishwaranjan Bhattacharjee, Ti...
ADBIS
2005
Springer
107views Database» more  ADBIS 2005»
14 years 3 months ago
Data Integration Using DataPile Structure
Abstract. One of the areas of data integration covers systems that maintain coherence among a heterogeneous set of databases. Such a system repeatedly collects data from the local ...
David Bednárek, David Obdrzálek, Jak...
SOSP
2001
ACM
14 years 7 months ago
BASE: Using Abstraction to Improve Fault Tolerance
ing Abstraction to Improve Fault Tolerance MIGUEL CASTRO Microsoft Research and RODRIGO RODRIGUES and BARBARA LISKOV MIT Laboratory for Computer Science Software errors are a major...
Rodrigo Rodrigues, Miguel Castro, Barbara Liskov
IEEEIAS
2009
IEEE
14 years 5 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof