Sciweavers

1235 search results - page 106 / 247
» Updating a cracked database
Sort
View
126
Voted
IC3
2009
15 years 2 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...
NETGAMES
2006
ACM
15 years 10 months ago
Applying database replication to multi-player online games
Multi-player Online Games (MOGs) have emerged as popular data intensive applications in recent years. Being used by many players simultaneously, they require a high degree of faul...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
ICWE
2004
Springer
15 years 10 months ago
Reliable and Adaptable Security Engineering for Database-Web Services
The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
16 years 4 months ago
Asynchronous view maintenance for VLSD databases
The query models of the recent generation of very large scale distributed (VLSD) shared-nothing data storage systems, including our own PNUTS and others (e.g. BigTable, Dynamo, Ca...
Parag Agrawal, Adam Silberstein, Brian F. Cooper, ...
DASFAA
2007
IEEE
187views Database» more  DASFAA 2007»
15 years 11 months ago
OntoDB: An Ontology-Based Database for Data Intensive Applications
Recently, several approaches and systems were proposed to store in the same database data and the ontologies describing their meanings. We call these databases, ontology-based data...
Dehainsala Hondjack, Guy Pierra, Ladjel Bellatrech...