Sciweavers

1830 search results - page 96 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
1998
ACM
89views Database» more  SIGMOD 1998»
15 years 7 months ago
Secure and Portable Database Extensibility
The functionality of extensible database servers can be augmented by user-de ned functions UDFs. However, the server's security and stability are concerns whenever new code...
Michael W. Godfrey, Tobias Mayr, Praveen Seshadri,...
IS
2006
15 years 3 months ago
Granularity reduction in temporal document databases
With rapidly decreasing storage costs, temporal document databases are now a viable solution in many contexts. However, storing an ever-growing database can still be too costly, a...
Kjetil Nørvåg
SIGMOD
2010
ACM
176views Database» more  SIGMOD 2010»
15 years 8 months ago
DCUBE: discrimination discovery in databases
Discrimination discovery in databases consists in finding unfair practices against minorities which are hidden in a dataset of historical decisions. The DCUBE system implements t...
Salvatore Ruggieri, Dino Pedreschi, Franco Turini
NETGAMES
2006
ACM
15 years 9 months ago
Applying database replication to multi-player online games
Multi-player Online Games (MOGs) have emerged as popular data intensive applications in recent years. Being used by many players simultaneously, they require a high degree of faul...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
101
Voted
SSDBM
2008
IEEE
177views Database» more  SSDBM 2008»
15 years 9 months ago
ELKI: A Software System for Evaluation of Subspace Clustering Algorithms
In order to establish consolidated standards in novel data mining areas, newly proposed algorithms need to be evaluated thoroughly. Many publications compare a new proposition – ...
Elke Achtert, Hans-Peter Kriegel, Arthur Zimek