Sciweavers

1830 search results - page 189 / 366
» Implementing a Tamper-Evident Database System
Sort
View
133
Voted
ICDE
2010
IEEE
202views Database» more  ICDE 2010»
16 years 3 months ago
Generating code for holistic query evaluation
We present the application of customized code generation to database query evaluation. The idea is to use a collection of highly efficient code templates and dynamically instantiat...
Konstantinos Krikellas, Marcelo Cintra, Stratis Vi...
117
Voted
ECCB
2005
IEEE
15 years 9 months ago
SIMAP - The similarity matrix of proteins
Similarity Matrix of Proteins (SIMAP) (http://mips.gsf. 10 de/simap) provides a database based on a precomputed similarity matrix covering the similarity space formed by .4 millio...
Roland Arnold, Thomas Rattei, Patrick Tischler, Mi...
121
Voted
SIGMOD
1999
ACM
107views Database» more  SIGMOD 1999»
15 years 7 months ago
Client-Site Query Extensions
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Tobias Mayr, Praveen Seshadri
129
Voted
EDBT
2010
ACM
125views Database» more  EDBT 2010»
15 years 6 months ago
A plan for OLAP
So far, data warehousing has often been discussed in the light of complex OLAP queries and as reporting facility for operative data. We argue that business planning as a means to ...
Bernhard Jaecksch, Wolfgang Lehner, Franz Faerber
SAC
2009
ACM
15 years 8 months ago
Leveraging OWL for GIS interoperability: rewards and pitfalls
Information systems often require combining datasets available in different formats, and geographical information systems are no exception. While semantic technologies have been u...
Serge Boucher, Esteban Zimányi