Sciweavers

1830 search results - page 147 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2008
IEEE
135views Database» more  ICDE 2008»
14 years 11 months ago
Online Filtering, Smoothing and Probabilistic Modeling of Streaming data
In this paper, we address the problem of extending a relational database system to facilitate efficient real-time application of dynamic probabilistic models to streaming data. he ...
Bhargav Kanagal, Amol Deshpande
DEXA
2004
Springer
96views Database» more  DEXA 2004»
14 years 3 months ago
A Selective Key-Oriented XML Index for the Index Selection Problem in XDBMS
Abstract. In relational database management systems indexes are used to accelerate specific queries. The selection of indexes is an important task when tuning a database which is ...
Beda Christoph Hammerschmidt, Martin Kempa, Volker...
CIDR
2009
133views Algorithms» more  CIDR 2009»
13 years 11 months ago
Principles for Inconsistency
Data consistency is very desirable because strong semantic properties make it easier to write correct programs that perform as users expect. However, there are good reasons why co...
Shel Finkelstein, Dean Jacobs, Rainer Brendle
CIKM
2010
Springer
13 years 9 months ago
Preference query evaluation over expensive attributes
Most database systems allow query processing over attributes that are derived at query runtime (e.g., user-defined functions and remote data calls to web services), making them e...
Justin J. Levandoski, Mohamed F. Mokbel, Mohamed E...
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
13 years 1 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...