Sciweavers

1830 search results - page 135 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
2000
ACM
159views Database» more  SIGMOD 2000»
14 years 2 months ago
DLFM: A Transactional Resource Manager
The DataLinks technology developed at IBM Almaden Research Center and now available in DB2 UDB 5.2 introduces a new data type called DATALINK for a database to reference and manag...
Hui-I Hsiao, Inderpal Narang
EDBT
2008
ACM
133views Database» more  EDBT 2008»
14 years 4 days ago
Action synchronization in P2P system testing
Testing peer-to-peer (P2P) systems is difficult because of the high numbers of nodes which can be heterogeneous and volatile. A test case may be composed of several ordered action...
Eduardo Cunha de Almeida, Gerson Sunyé, Pat...
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
14 years 11 months ago
Simultaneous Equation Systems for Query Processing on Continuous-Time Data Streams
We introduce Pulse, a framework for processing continuous queries over models of continuous-time data, which can compactly and accurately represent many real-world activities and p...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
14 years 3 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
VLDB
2001
ACM
149views Database» more  VLDB 2001»
14 years 2 months ago
Cache-Conscious Concurrency Control of Main-Memory Indexes on Shared-Memory Multiprocessor Systems
Recent research addressed the importance of optimizing L2 cache utilization in the design of main memory indexes and proposed the so-called cache-conscious indexes such as the CSB...
Sang Kyun Cha, Sangyong Hwang, Kihong Kim, Keunjoo...