In this paper, we first introduce the database aspects of the groupware product Lotus Domino/Notes and then describe, in some more detail, many of the logging and recovery enhance...
C. Mohan, Ron Barber, S. Watts, Amit Somani, Marko...
Abstract. We consider the problem of specifying and computing consistent answers to queries against databases that do not satisfy given integrity constraints. This is done by simul...
Marcelo Arenas, Leopoldo E. Bertossi, Michael Kife...
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Recently, several approaches and systems were proposed to store in the same database data and the ontologies describing their meanings. We call these databases, ontology-based data...
Dehainsala Hondjack, Guy Pierra, Ladjel Bellatrech...
—The centralized teaching approach is different from the general lecture course, as it requires students focus all efforts within a period of time to finish a project task in ord...