Sciweavers

698 search results - page 132 / 140
» Auditing SQL Queries
Sort
View
NAR
2011
214views Computer Vision» more  NAR 2011»
14 years 18 days ago
IEDB-3D: structural data within the immune epitope database
IEDB-3D is the 3D structural component of the Immune Epitope Database (IEDB) available via the ‘Browse by 3D Structure’ page at http://www.iedb .org. IEDB-3D catalogs B- and T...
Julia V. Ponomarenko, Nikitas Papangelopoulos, Dir...
NAR
2011
190views Computer Vision» more  NAR 2011»
14 years 18 days ago
New tools and methods for direct programmatic access to the dbSNP relational database
Genome-wide association studies often incorporate information from public biological databases in order to provide a biological reference for interpreting the results. The dbSNP d...
Scott F. Saccone, Jiaxi Quan, Gaurang Mehta, Rapha...
SIGCOMM
2012
ACM
13 years 6 days ago
HyperDex: a distributed, searchable key-value store
Distributed key-value stores are now a standard component of high-performance web services and cloud computing applications. While key-value stores offer significant performance...
Robert Escriva, Bernard Wong, Emin Gün Sirer
ICDE
2009
IEEE
166views Database» more  ICDE 2009»
15 years 11 months ago
Supporting Database Applications as a Service
Abstract-- Multi-tenant data management is a form of Software as a Service (SaaS), whereby a third party service provider hosts databases as a service and provides its customers wi...
Mei Hui, Dawei Jiang, Guoliang Li, Yuan Zhou
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 11 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...