Sciweavers

1830 search results - page 23 / 366
» Implementing a Tamper-Evident Database System
Sort
View
AICT
2006
IEEE
110views Communications» more  AICT 2006»
13 years 11 months ago
Design and Implementation of the NetTraveler Middleware System based on Web Services
We present NetTraveler a database middleware system for WANs that is designed to efficiently run queries over sites that are either mobile clients or enterprise servers. NetTravel...
Elliot A. Vargas-Figueroa, Manuel Rodriguez-Martin...
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
14 years 14 days ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
OSDI
2000
ACM
13 years 9 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
SSDBM
1999
IEEE
86views Database» more  SSDBM 1999»
13 years 12 months ago
A Query System in a Biological Database
In this paper, we present a query system that has been implemented in a practical biological database - GPCRDB. Distinguishing features of this system include: smart query relaxat...
Dunren Che, Yangjun Chen, Karl Aberer
SIGMOD
2012
ACM
224views Database» more  SIGMOD 2012»
11 years 10 months ago
Tiresias: the database oracle for how-to queries
How-To queries answer fundamental data analysis questions of the form: “How should the input change in order to achieve the desired output”. As a Reverse Data Management probl...
Alexandra Meliou, Dan Suciu