Sciweavers

1830 search results - page 206 / 366
» Implementing a Tamper-Evident Database System
Sort
View
113
Voted
BIBE
2000
IEEE
110views Bioinformatics» more  BIBE 2000»
15 years 7 months ago
FURY: Fuzzy Unification and Resolution Based on Edit Distance
We present a theoretically founded framework for fuzzy unification and resolution based on edit distance over trees. Our framework extends classical unification and resolution con...
David Gilbert, Michael Schroeder
207
Voted
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
16 years 3 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
134
Voted
ISMIR
2000
Springer
128views Music» more  ISMIR 2000»
15 years 7 months ago
PROMS: A Web-based Tool for Searching in Polyphonic Music
One major task of a digital music library (DML) is to provide techniques to locate a queried musical pattern in all pieces of music in the database containing that pattern. For a ...
Michael Clausen, R. Engelbrecht, D. Meyer, J. Schm...
141
Voted
EDBT
1994
ACM
117views Database» more  EDBT 1994»
15 years 7 months ago
Content Routing for Distributed Information Servers
We describe a system that provides query based associative access to the contents of distributed information servers. In typical distributed information systems there are so many o...
Mark A. Sheldon, Andrzej Duda, Ron Weiss, James O'...
120
Voted
VLDB
1991
ACM
146views Database» more  VLDB 1991»
15 years 7 months ago
An Evaluation of Non-Equijoin Algorithms
A non-equijoin of relations R and S is a band join if the join predicate requires values in the join attribute of R to fall within a speci ed band about the values in the join att...
David J. DeWitt, Jeffrey F. Naughton, Donovan A. S...