Sciweavers

1830 search results - page 22 / 366
» Implementing a Tamper-Evident Database System
Sort
View
DATAMINE
2000
118views more  DATAMINE 2000»
13 years 7 months ago
Spatial Data Mining: Database Primitives, Algorithms and Efficient DBMS Support
Abstract: Spatial data mining algorithms heavily depend on the efficient processing of neighborhood relations since the neighbors of many objects have to be investigated in a singl...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...
DEXAW
1999
IEEE
119views Database» more  DEXAW 1999»
13 years 12 months ago
Atomicity Implementation in Mobile Computing
Distributed systems using mobile computing do not have the traditional ACID properties (Atomicity, Consistency, Isolation and Durability), and, therefore, consistency problems may...
Lars Frank
SIGMOD
2001
ACM
146views Database» more  SIGMOD 2001»
14 years 7 months ago
On Supporting Containment Queries in Relational Database Management Systems
Virtually all proposals for querying XML include a class of query we term "containment queries". It is also clear that in the foreseeable future, a substantial amount of...
Chun Zhang, Jeffrey F. Naughton, David J. DeWitt, ...
CCS
1994
ACM
13 years 11 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
GIS
2003
ACM
14 years 8 months ago
An efficient r-tree implementation over flash-memory storage systems
For many applications with spatial data management such as Geographic Information Systems (GIS), block-oriented access over flash memory could introduce a significant number of no...
Chin-Hsien Wu, Li-Pin Chang, Tei-Wei Kuo