Sciweavers

1830 search results - page 145 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ADBIS
2003
Springer
108views Database» more  ADBIS 2003»
14 years 3 months ago
Evaluation of Common Counting Method for Concurrent Data Mining Queries
Data mining queries are often submitted concurrently to the data mining system. The data mining system should take advantage of overlapping of the mined datasets. In this paper we ...
Marek Wojciechowski, Maciej Zakrzewicz
DEXA
1998
Springer
98views Database» more  DEXA 1998»
14 years 2 months ago
Browsing SGML Documents with Maps: The French "Inventaire" Experience
For GIS, SGML document servers and other highly specialized application domains, the systems integration problem is essential since the available software often is complex and wou...
Bernd Amann, Dan Vodislav, Julio Fernandes, George...
CORR
2011
Springer
185views Education» more  CORR 2011»
13 years 5 months ago
Sound and Complete Query Answering in Intensional P2P Data Integration
Contemporary use of the term ’intension’ derives from the traditional logical doctrine that an idea has both an extension and an intension. In this paper we introduce an intens...
Zoran Majkic
PRDC
1999
IEEE
14 years 2 months ago
Experimental Assessment of COTS DBMS Robustness under Transient Faults
This paper evaluates the behavior of a common off-theshelf (COTS) database management system (DBMS) in presence of transient faults. Database applications have traditionally been ...
Diamantino Costa, Henrique Madeira
ICDE
2001
IEEE
146views Database» more  ICDE 2001»
14 years 11 months ago
The Skyline Operator
We propose to extend database systems by a Skyline operation. This operation filters out a set of interesting points from a potentially large set of data points. A point is intere...
Stephan Börzsönyi, Donald Kossmann, Konr...