Sciweavers

1830 search results - page 17 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SAC
2011
ACM
12 years 10 months ago
Spatial network modeling for databases
Spatial networks like transportation, power, and pipeline networks are a ubiquitous spatial concept in everyday life and play an important role for navigational and routing purpos...
Virupaksha Kanjilal, Markus Schneider
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 8 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
PVLDB
2010
146views more  PVLDB 2010»
13 years 2 months ago
Generating Efficient Execution Plans for Vertically Partitioned XML Databases
Experience with relational systems has shown that distribution is an effective way of improving the scalability of query evaluation. In this paper, we show how distributed query e...
Patrick Kling, M. Tamer Özsu, Khuzaima Daudje...
SIGMOD
1995
ACM
97views Database» more  SIGMOD 1995»
13 years 11 months ago
Implementing Crash Recovery in QuickStore: A Performance Study
Implementing crash recovery in an Object-Oriented Database System (OODBMS) raises several challenging issues for performance that are not present in traditional DBMSs. These perfo...
Seth J. White, David J. DeWitt
ICDE
2002
IEEE
232views Database» more  ICDE 2002»
14 years 9 months ago
DBXplorer: A System for Keyword-Based Search over Relational Databases
Internet search engines have popularized the keywordbased search paradigm. While traditional database management systems offer powerful query languages, they do not allow keyword-...
Sanjay Agrawal, Surajit Chaudhuri, Gautam Das