Sciweavers

1830 search results - page 132 / 366
» Implementing a Tamper-Evident Database System
Sort
View
EDBT
2010
ACM
127views Database» more  EDBT 2010»
14 years 5 months ago
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information re...
Ragib Hasan, Marianne Winslett
PVLDB
2010
129views more  PVLDB 2010»
13 years 8 months ago
iGraph: A Framework for Comparisons of Disk-Based Graph Indexing Techniques
Graphs are of growing importance in modeling complex structures such as chemical compounds, proteins, images, and program dependence. Given a query graph Q, the subgraph isomorphi...
Wook-Shin Han, Jinsoo Lee, Minh-Duc Pham, Jeffrey ...
ER
2010
Springer
129views Database» more  ER 2010»
13 years 9 months ago
Specifying Aggregation Functions in Multidimensional Models with OCL
Multidimensional models are at the core of data warehouse systems, since they allow decision makers to early define the relevant information and queries that are required to satis...
Jordi Cabot, Jose-Norberto Mazón, Jes&uacut...
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 4 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
ICEIS
2009
IEEE
14 years 5 months ago
MIDAS: A Middleware for Information Systems with QoS Concerns
One of the most difficult tasks in the design of information systems is how to control the behaviour of the back-end storage engine, usually a relational database. As the load on t...
Luís Fernando Orleans, Geraldo Zimbrã...