Sciweavers

1830 search results - page 178 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2005
IEEE
143views Database» more  ICDE 2005»
15 years 4 days ago
Postgres-R(SI): Combining Replica Control with Concurrency Control based on Snapshot Isolation
Replicating data over a cluster of workstations is a powerful tool to increase performance, and provide faulttolerance for demanding database applications. The big challenge in su...
Shuqing Wu, Bettina Kemme
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
14 years 4 months ago
Derby/S: a DBMS for sample-based query answering
Although approximate query processing is a prominent way to cope with the requirements of data analysis applications, current database systems do not provide integrated and compre...
Anja Klein, Rainer Gemulla, Philipp Rösch, Wo...
CIDR
2009
152views Algorithms» more  CIDR 2009»
13 years 12 months ago
Visualizing the robustness of query execution
In database query processing, actual run-time conditions (e.g., actual selectivities and actual available memory) very often differ from compile-time expectations of run-time cond...
Goetz Graefe, Harumi A. Kuno, Janet L. Wiener
TMC
2010
119views more  TMC 2010»
13 years 9 months ago
SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments
—This paper proposes a cache consistency scheme based on a previously proposed architecture for caching database data in MANETs. The original scheme for data caching stores the q...
Khaleel W. Mershad, Hassan Artail
VLDB
1999
ACM
145views Database» more  VLDB 1999»
14 years 3 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...