Sciweavers

1830 search results - page 126 / 366
» Implementing a Tamper-Evident Database System
Sort
View
DEXAW
2004
IEEE
166views Database» more  DEXAW 2004»
15 years 7 months ago
Development of Flexible Peer-To-Peer Information Systems Using Adaptable Mobile Agents
Wide-area networks provide an easy access to many different distributed and heterogeneous data sources. The development of automated operating tools is still complex, particularly...
Jean-Paul Arcangeli, Sebastien Leriche, Marc Pante...
117
Voted
EDBT
2006
ACM
111views Database» more  EDBT 2006»
16 years 3 months ago
BISON: Providing Business Information Analysis as a Service
In this paper, we present the architecture of a Business Information Analysis provisioning system, BISON. The system is built based on a functioning business information analysis ...
Hakan Hacigümüs, James Rhodes, Jeffrey T...
121
Voted
ER
1998
Springer
127views Database» more  ER 1998»
15 years 7 months ago
Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication
1 Rumor is an optimistically replicated le system designed for use in mobile computers. Rumor uses a peer model that allows opportunistic update propagation among any sites replica...
Richard G. Guy, Peter L. Reiher, David Ratner, Mic...
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
16 years 4 months ago
Accurate and Efficient Inter-Transaction Dependency Tracking
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...
Tzi-cker Chiueh, Shweta Bajpai
132
Voted
WWW
2003
ACM
16 years 4 months ago
Text joins in an RDBMS for web data integration
The integration of data produced and collected across autonomous, heterogeneous web services is an increasingly important and challenging problem. Due to the lack of global identi...
Luis Gravano, Panagiotis G. Ipeirotis, Nick Koudas...