Sciweavers

427 search results - page 37 / 86
» Querying and Manipulating Temporal Databases
Sort
View
156
Voted
VLDB
2010
ACM
190views Database» more  VLDB 2010»
15 years 1 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
152
Voted
CSMR
2005
IEEE
15 years 9 months ago
Database Wrappers Development: Towards Automatic Generation
Wrapping databases allows them to be reused in formerly unplanned contexts, such as web-based applications or federated systems. Indeed, a wrapper can provide external clients of ...
Philippe Thiran, Jean-Luc Hainaut, Geert-Jan Hoube...
DAWAK
1999
Springer
15 years 7 months ago
Modeling KDD Processes within the Inductive Database Framework
One of the most challenging problems in data manipulation in the future is to be able to e ciently handle very large databases but also multiple induced properties or generalizatio...
Jean-François Boulicaut, Mika Klemettinen, ...
SIGMETRICS
2000
ACM
15 years 7 months ago
An analytical model of the working-set sizes in decision-support systems
This paper presents an analytical model to study how working sets scale with database size and other applications parameters in decision-support systems (DSS). The model uses appl...
Magnus Karlsson, Per Stenström
120
Voted
CAISE
2006
Springer
15 years 7 months ago
Extending Database Technology: a New Document Data Type
Our research explores a new database extension. Our aim is to see how far it is possible to support collaborative editing and document provenance with database technology, and exte...
Stefania Leone