Sciweavers

1830 search results - page 222 / 366
» Implementing a Tamper-Evident Database System
Sort
View
CIDR
2007
116views Algorithms» more  CIDR 2007»
15 years 5 months ago
Managing Query Compilation Memory Consumption to Improve DBMS Throughput
While there are known performance trade-offs between database page buffer pool and query execution memory allocation policies, little has been written on the impact of query compi...
Boris Baryshnikov, Cipri Clinciu, Conor Cunningham...
SIGSAND
2008
15 years 5 months ago
Relational Model Driven Application Design
Abstract: A closer look at typical information systems shows that relatively simple routines often contribute significantly to the overall expenses of the software development proc...
Michael Guckert, René Gerlach
141
Voted
IADIS
2003
15 years 5 months ago
A Multiagent Architecture for Information Retrieval in Distributed and Heterogeneous Data Sources
With the consolidation of the Internet and other computer networks, the need of sophisticated systems to retrieve information increased enormously. In these networks, information ...
Rafael T. de Sousa Jr., Alexandre C. V. de Oliveir...
156
Voted
CORR
2008
Springer
132views Education» more  CORR 2008»
15 years 4 months ago
Materialized View Selection by Query Clustering in XML Data Warehouses
XML data warehouses form an interesting basis for decision-support applications that exploit complex data. However, native XML database management systems currently bear limited p...
Hadj Mahboubi, Kamel Aouiche, Jérôme ...
SSD
2009
Springer
145views Database» more  SSD 2009»
15 years 10 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...