Sciweavers

1830 search results - page 207 / 366
» Implementing a Tamper-Evident Database System
Sort
View
130
Voted
HASKELL
2008
ACM
15 years 4 months ago
Language and program design for functional dependencies
Eight years ago, functional dependencies, a concept from the theory of relational databases, were proposed as a mechanism for avoiding common problems with multiple parameter type...
Mark P. Jones, Iavor S. Diatchki
126
Voted
LISP
2008
97views more  LISP 2008»
15 years 3 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea
94
Voted
BIBE
2008
IEEE
115views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
The Mouse Resource Browser (MRB) - A near-complete registry of mouse resources
—The Mouse Resource Browser MRB (http://bioit.fleming.gr/mrb) is an easy-to-use database for searching and retrieving mouse resource information. Currently, MRB hosts a list of 2...
Michael Zouberakis, C. Chandras, John M. Hancock, ...
117
Voted
SSDBM
2000
IEEE
87views Database» more  SSDBM 2000»
15 years 8 months ago
A Tool for Nesting and Clustering Large Objects
In implementations of non-standard database systems, large objects are often embedded within an aggregate of different types, i.e. a tuple. For a given size and access probabilit...
Stefan Dieker, Ralf Hartmut Güting, Miguel Ro...
124
Voted
VLDB
1999
ACM
136views Database» more  VLDB 1999»
15 years 7 months ago
O-O, What Have They Done to DB2?
In this paper, we describe our recent experiences in adding a number of object-relational extensions to the DB2 Universal Database UDB system as part of a research and developme...
Michael J. Carey, Donald D. Chamberlin, Srinivasa ...