Sciweavers

1497 search results - page 136 / 300
» Constraint Databases: A Survey
Sort
View
IJRR
2007
236views more  IJRR 2007»
14 years 10 months ago
Towards High-resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by sensor-level environmental constraints and the mismatch between available navigation and sensor acc...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
DASFAA
2007
IEEE
165views Database» more  DASFAA 2007»
15 years 1 months ago
Making the Most of Cache Groups
Cache groups are a powerful concept for database caching, which is used to relieve the backend database load and to keep referenced data close to the application programs at the &q...
Andreas Bühmann, Theo Härder
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
14 years 1 months ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
AMW
2009
14 years 11 months ago
Stop the Chase: Short Contribution
Abstract. The chase procedure, an algorithm proposed 25+ years ago to fix constraint violations in database instances, has been successfully applied in a variety of contexts, such ...
Michael Meier 0002, Michael Schmidt, Georg Lausen
DASFAA
2009
IEEE
129views Database» more  DASFAA 2009»
15 years 4 months ago
Towards Preference-Constrained k-Anonymisation
Abstract. In this paper, we propose a novel preference-constrained approach to k-anonymisation. In contrast to the existing works on kanonymisation which attempt to satisfy a minim...
Grigorios Loukides, Achilles Tziatzios, Jianhua Sh...