Sciweavers

1830 search results - page 54 / 366
» Implementing a Tamper-Evident Database System
Sort
View
VLDB
1989
ACM
105views Database» more  VLDB 1989»
13 years 11 months ago
Monitoring Database Objects
A method is described for actively interfacing an Object-Oriented Database Management System (OODBMS) to application pre grams. The method, called a database monitor, observes how...
Tore Risch
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
RIDE
2003
IEEE
14 years 1 months ago
On Database Support for Multilingual Environments
Global e-Commerce and mass-outreach e-Governance programs have brought into sharp focus the need for database systems to store and manipulate text data efficiently in a suite of ...
A. Kumaran, Jayant R. Haritsa
UIST
1997
ACM
13 years 12 months ago
Designing and Implementing Asynchronous Collaborative Applications with Bayou
Asynchronous collaboration is characterized by the degree of independence collaborators have from one another. In particular, collaborators working asynchronously typically have l...
W. Keith Edwards, Elizabeth D. Mynatt, Karin Peter...
VLDB
2005
ACM
121views Database» more  VLDB 2005»
14 years 1 months ago
Improving Database Performance on Simultaneous Multithreading Processors
Simultaneous multithreading (SMT) allows multiple threads to supply instructions to the instruction pipeline of a superscalar processor. Because threads share processor resources,...
Jingren Zhou, John Cieslewicz, Kenneth A. Ross, Mi...