Sciweavers

1497 search results - page 115 / 300
» Constraint Databases: A Survey
Sort
View
74
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
KDD
1994
ACM
115views Data Mining» more  KDD 1994»
15 years 2 months ago
Extracting Domain Semantics for Knowledge Discovery in Relational Databases
Our research investigates howdomainsemantics are discovered froma relational database at a high level of automation. Thediscoveries are then represented as the extendedEntityRelat...
Roger H. L. Chiang, Terence M. Barron, Veda C. Sto...
JSS
1998
87views more  JSS 1998»
14 years 9 months ago
On using similarity for concurrency control in real-time database systems
Most of the proposed concurrency control protocols for real-time database systems (RTDBS) are based on serializability theorem. Owing to the unique characteristics of real-time da...
Kam-yiu Lam, Wai-cheong Yau
PVLDB
2010
115views more  PVLDB 2010»
14 years 8 months ago
CORADD: Correlation Aware Database Designer for Materialized Views and Indexes
We describe an automatic database design tool that exploits correlations between attributes when recommending materialized views (MVs) and indexes. Although there is a substantial...
Hideaki Kimura, George Huo, Alexander Rasin, Samue...
ICDT
2012
ACM
247views Database» more  ICDT 2012»
13 years 9 days ago
A normal form for preventing redundant tuples in relational databases
We introduce a new normal form, called essential tuple normal form (ETNF), for relations in a relational database where the constraints are given by functional dependencies and jo...
Hugh Darwen, C. J. Date, Ronald Fagin