Sciweavers

3095 search results - page 418 / 619
» Ubiquitous presence systems
Sort
View
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 2 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
ICFP
2000
ACM
14 years 2 months ago
Intersection types and computational effects
We show that standard formulations of intersection type systems are unsound in the presence of computational effects, and propose a solution similar to the value restriction for ...
Rowan Davies, Frank Pfenning
DBPL
1997
Springer
87views Database» more  DBPL 1997»
14 years 2 months ago
Incremental Recomputation of Recursive Queries with Nested Sets and Aggregate Functions
We examine the power of incremental evaluation systems that use an SQL-like language for maintaining recursively-de ned views. We show that recursive queries such as transitive clo...
Leonid Libkin, Limsoon Wong
VLDB
1990
ACM
80views Database» more  VLDB 1990»
14 years 2 months ago
Performance Analysis of Disk Arrays under Failure
Disk arrays (RAID) have been proposed as a possible approach to solving the emerging I/O bottleneck problem. The performance of a RAID system when all disks are operational and th...
Richard R. Muntz, John C. S. Lui
CCS
2007
ACM
14 years 2 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...