Sciweavers

SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 8 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
SIGMOD
1987
ACM
52views Database» more  SIGMOD 1987»
15 years 8 months ago
A System for Semantic Query Optimization
Sreekumar T. Shenoy, Z. Meral Özsoyoglu
SIGMOD
1987
ACM
55views Database» more  SIGMOD 1987»
15 years 8 months ago
Magic Counting Methods
Domenico Saccà, Carlo Zaniolo
SIGMOD
1987
ACM
69views Database» more  SIGMOD 1987»
15 years 8 months ago
Extending the Relational Algebra to Support Transaction Time
In this paper we discuss extensions to the conventional relatronal algebra to support transaction time We show that these extensions are applicable to hrstorlcal algebras that sup...
L. Edwin McKenzie, Richard T. Snodgrass
SIGMOD
1987
ACM
95views Database» more  SIGMOD 1987»
15 years 8 months ago
Query Optimization by Simulated Annealing
Yannis E. Ioannidis, Eugene Wong