Sciweavers

10210 search results - page 309 / 2042
» Configuring Database Systems
Sort
View
135
Voted
EUROPAR
2005
Springer
15 years 9 months ago
MADIS: A Slim Middleware for Database Replication
Availability and performance can be improved using data replication as the basic technique, thus benefitting the services provided by a distributed system. However, replication im...
Luis Irún-Briz, Hendrik Decker, Rubé...
151
Voted
CIKM
2006
Springer
15 years 7 months ago
Information retrieval from relational databases using semantic queries
Relational databases are widely used today as a mechanism for providing access to structured data. They, however, are not suitable for typical information finding tasks of end use...
Anand Ranganathan, Zhen Liu
118
Voted
SIGMOD
1995
ACM
88views Database» more  SIGMOD 1995»
15 years 7 months ago
Semantic Assumptions and Query Evaluation in Temporal Databases
When querying a temporal database, a user often makes certain semantic assumptions on stored temporal data. This paper formalizes and studies two types of semantic assumptions: po...
Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino...
113
Voted
IADIS
2004
15 years 4 months ago
A new use of XML for querying databases in Web applications
Internet has changed many aspects of our society, transforming it in e-society, and is having special importance in business world, Internet has converted business in e-business. ...
Ana Fermoso García, María José...
134
Voted
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
15 years 5 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü