Sciweavers

1830 search results - page 56 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2012
IEEE
256views Database» more  ICDE 2012»
11 years 10 months ago
Micro-Specialization in DBMSes
Abstract—Relational database management systems are general in the sense that they can handle arbitrary schemas, queries, and modifications; this generality is implemented using...
Rui Zhang, Richard T. Snodgrass, Saumya Debray
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 9 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
DBVIS
1995
146views Database» more  DBVIS 1995»
13 years 11 months ago
The Tioga-2 Database Visualization Environment
Abstract. This paper reports on user experience with Tioga, a DBMScentric visualization tool developed at Berkeley. Based on this experience, we have designed Tioga-2 as a direct m...
Alexander Aiken, Jolly Chen, Mark Lin, Mybrid Spal...
IADIS
2003
13 years 9 months ago
Application of Metadata and Replication Mechanisms in Industrial Databases
Power transformers' failures carry great costs to electric companies since they need resources to recover from them and to perform periodical maintenance. To avoid this probl...
Perfecto Mariño, César A. Sigüe...
CLEIEJ
2006
87views more  CLEIEJ 2006»
13 years 7 months ago
Integrity Constraint Checking in Distributed Nested Transactions over a Database Cluster
This paper presents a solution to check referential integrity constraints and conjunctive global constraints in a relational multi database system. It also presents the experiment...
Stéphane Gançarski, Claudia Le&oacut...