Sciweavers

1830 search results - page 135 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
2000
ACM
159views Database» more  SIGMOD 2000»
15 years 7 months ago
DLFM: A Transactional Resource Manager
The DataLinks technology developed at IBM Almaden Research Center and now available in DB2 UDB 5.2 introduces a new data type called DATALINK for a database to reference and manag...
Hui-I Hsiao, Inderpal Narang
EDBT
2008
ACM
133views Database» more  EDBT 2008»
15 years 5 months ago
Action synchronization in P2P system testing
Testing peer-to-peer (P2P) systems is difficult because of the high numbers of nodes which can be heterogeneous and volatile. A test case may be composed of several ordered action...
Eduardo Cunha de Almeida, Gerson Sunyé, Pat...
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
16 years 4 months ago
Simultaneous Equation Systems for Query Processing on Continuous-Time Data Streams
We introduce Pulse, a framework for processing continuous queries over models of continuous-time data, which can compactly and accurately represent many real-world activities and p...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
15 years 8 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
VLDB
2001
ACM
149views Database» more  VLDB 2001»
15 years 7 months ago
Cache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems
Recent research addressed the importance of optimizing L2 cache utilization in the design of main memory indexes and proposed the so-called cache-conscious indexes such as the CSB...
Sang Kyun Cha, Sangyong Hwang, Kihong Kim, Keunjoo...