Sciweavers

1830 search results - page 33 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2005
IEEE
98views Database» more  ICDE 2005»
14 years 1 months ago
An Implementation Scheme of Relational Tables
AbstractAbstractAbstract In this paper, an implementation scheme for relational tables is proposed. Our scheme employs extendible chunked arrays. We are proposing an implementation...
Masayuki Kuroda, Naoki Amma, K. M. Azharul Hasan, ...
VLDB
1998
ACM
134views Database» more  VLDB 1998»
13 years 12 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
DEXAW
2007
IEEE
104views Database» more  DEXAW 2007»
14 years 2 months ago
An MDA Approach to Implement Personal IR Tools
We introduce TIRA1 , a software architecture for the rapid prototyping of tailored information retrieval (IR) tools. TIRA allows to compose personal IR tools from atomic IR servic...
Sven Meyer zu Eissen, Benno Stein
SIGMOD
1996
ACM
120views Database» more  SIGMOD 1996»
13 years 11 months ago
Implementing Data Cubes Efficiently
Decision support applications involve complex queries on very large databases. Since response times should be small, query optimization is critical. Users typically view the data ...
Venky Harinarayan, Anand Rajaraman, Jeffrey D. Ull...
XSYM
2004
Springer
161views Database» more  XSYM 2004»
14 years 1 months ago
Adjustable Transaction Isolation in XML Database Management Systems
Processing XML documents in multi-user database management environments requires a suitable storage model of XML data, support of typical XML document processing (XDP) interfaces, ...
Michael Peter Haustein, Theo Härder