Sciweavers

1830 search results - page 133 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ADC
2004
Springer
109views Database» more  ADC 2004»
14 years 2 months ago
A Model of Dynamic Resource Allocation in Workflow Systems
Current collaborative work environments are characterized by dynamically changing organizational structures. Although there have been several efforts to refine work distribution, ...
Guido Governatori, Antonino Rotolo, Shazia Wasim S...
VLDB
1991
ACM
220views Database» more  VLDB 1991»
14 years 1 months ago
A Performance Evaluation of Multi-Level Transaction Management
Multi-level transactions are a variant of open nested transactions in which the subtransactions correspond to operations at different levels of a layered system architecture. The ...
Christof Hasse, Gerhard Weikum
ADC
2009
Springer
134views Database» more  ADC 2009»
14 years 5 months ago
Mobile Information Exchange and Integration: From Query to Application Layer
Due to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational ...
Van T. K. Tran, Raymond K. Wong, William K. Cheung...
ADC
2005
Springer
111views Database» more  ADC 2005»
14 years 3 months ago
An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories
This paper describes an access control method of the XML repository system, SAXOPHONE, which was implemented at Tokyo Metropolitan University. The main feature of our research is ...
Shohei Yokoyama, Manabu Ohta, Kaoru Katayama, Hiro...
ADBIS
2004
Springer
153views Database» more  ADBIS 2004»
14 years 3 months ago
Cooperative Transaction Processing between Clients and Servers
Business rules are often implemented as stored procedures in a database server. These procedures are triggered by various clients, but the execution load is fully centralized on th...
Steffen Jurk, Ulf Leser, José-Luis Marzo