Sciweavers

1830 search results - page 208 / 366
» Implementing a Tamper-Evident Database System
Sort
View
139
Voted
ER
1998
Springer
147views Database» more  ER 1998»
15 years 7 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...
134
Voted
ICWL
2007
Springer
15 years 9 months ago
Language-Driven Development of Web-Based Learning Applications
In this paper we propose a language-driven approach for the high-level design of web-based learning applications. In our approach we define a domainspecific language that character...
José Luis Sierra, Baltasar Fernández...
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 10 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
226
Voted
SIGMOD
2009
ACM
140views Database» more  SIGMOD 2009»
16 years 3 months ago
Distributed data-parallel computing using a high-level programming language
The Dryad and DryadLINQ systems offer a new programming model for large scale data-parallel computing. They generalize previous execution environments such as SQL and MapReduce in...
Michael Isard, Yuan Yu
154
Voted
VLDB
2005
ACM
112views Database» more  VLDB 2005»
15 years 9 months ago
Content-Based Routing: Different Plans for Different Data
Query optimizers in current database systems are designed to pick a single efficient plan for a given query based on current statistical properties of the data. However, different...
Pedro Bizarro, Shivnath Babu, David J. DeWitt, Jen...