Sciweavers

1830 search results - page 96 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
1998
ACM
89views Database» more  SIGMOD 1998»
14 years 2 months ago
Secure and Portable Database Extensibility
The functionality of extensible database servers can be augmented by user-de ned functions UDFs. However, the server's security and stability are concerns whenever new code...
Michael W. Godfrey, Tobias Mayr, Praveen Seshadri,...
IS
2006
13 years 10 months ago
Granularity reduction in temporal document databases
With rapidly decreasing storage costs, temporal document databases are now a viable solution in many contexts. However, storing an ever-growing database can still be too costly, a...
Kjetil Nørvåg
SIGMOD
2010
ACM
176views Database» more  SIGMOD 2010»
14 years 3 months ago
DCUBE: discrimination discovery in databases
Discrimination discovery in databases consists in finding unfair practices against minorities which are hidden in a dataset of historical decisions. The DCUBE system implements t...
Salvatore Ruggieri, Dino Pedreschi, Franco Turini
NETGAMES
2006
ACM
14 years 4 months ago
Applying database replication to multi-player online games
Multi-player Online Games (MOGs) have emerged as popular data intensive applications in recent years. Being used by many players simultaneously, they require a high degree of faul...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
SSDBM
2008
IEEE
177views Database» more  SSDBM 2008»
14 years 4 months ago
ELKI: A Software System for Evaluation of Subspace Clustering Algorithms
In order to establish consolidated standards in novel data mining areas, newly proposed algorithms need to be evaluated thoroughly. Many publications compare a new proposition – ...
Elke Achtert, Hans-Peter Kriegel, Arthur Zimek