Sciweavers

132 search results - page 13 / 27
» Optimal Database Locks for Efficient Integrity Checking
Sort
View
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
14 years 7 months ago
A Multi-paradigm Querying Approach for a Generic Multimedia Database Management System
To truly meet the requirements of multimedia database (MMDB) management, an integrated framework for modeling, managing and retrieving various kinds of media data in a uniform way...
Ji-Rong Wen, Qing Li, Wei-Ying Ma, HongJiang Zhang
VLDB
1989
ACM
87views Database» more  VLDB 1989»
13 years 11 months ago
Situation Monitoring for Active Databases
paper is concerned with ways of specifying situations and evaluating them efficiently. The techniques described in this paper were developed as part of the HiPAC (High Performance...
Arnon Rosenthal, Sharma Chakravarthy, Barbara T. B...
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
13 years 11 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna

Tutorial
905views
15 years 7 months ago
Location-aware Query Processing and Optimization
The wide spread use of cellular phones, handheld devices, and GPS-like technology enables location-aware environments where virtually all objects are aware of their locations. Loca...
ER
2008
Springer
110views Database» more  ER 2008»
13 years 9 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi