Sciweavers

1830 search results - page 23 / 366
» Implementing a Tamper-Evident Database System
Sort
View
AICT
2006
IEEE
110views Communications» more  AICT 2006»
15 years 7 months ago
Design and Implementation of the NetTraveler Middleware System based on Web Services
We present NetTraveler a database middleware system for WANs that is designed to efficiently run queries over sites that are either mobile clients or enterprise servers. NetTravel...
Elliot A. Vargas-Figueroa, Manuel Rodriguez-Martin...
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
15 years 8 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
OSDI
2000
ACM
15 years 4 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
SSDBM
1999
IEEE
86views Database» more  SSDBM 1999»
15 years 7 months ago
A Query System in a Biological Database
In this paper, we present a query system that has been implemented in a practical biological database - GPCRDB. Distinguishing features of this system include: smart query relaxat...
Dunren Che, Yangjun Chen, Karl Aberer
149
Voted
SIGMOD
2012
ACM
224views Database» more  SIGMOD 2012»
13 years 5 months ago
Tiresias: the database oracle for how-to queries
How-To queries answer fundamental data analysis questions of the form: “How should the input change in order to achieve the desired output”. As a Reverse Data Management probl...
Alexandra Meliou, Dan Suciu