Sciweavers

1497 search results - page 65 / 300
» Constraint Databases: A Survey
Sort
View
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
15 years 11 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
ICNC
2005
Springer
15 years 3 months ago
On Designing DNA Databases for the Storage and Retrieval of Digital Signals
Abstract. In this paper we propose a procedure for the storage and retrieval of digital signals utilizing DNA. Digital signals are encoded in DNA sequences that satisfy among other...
Sotirios A. Tsaftaris, Aggelos K. Katsaggelos
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
BIB
2002
136views more  BIB 2002»
14 years 9 months ago
Technologies for Integrating Biological Data
The process of building a new database relevant to some field of study in biomedicine involves transforming, integrating, and cleansing multiple data sources, as well as adding ne...
L. Wong
ICDE
1996
IEEE
124views Database» more  ICDE 1996»
15 years 11 months ago
Automating the Assembly of Presentations from Multimedia Databases
A multimedia presentation refers to the presentation of multimedia data using output devices such as monitors for text and video, and speakers for audio. Each presentation consist...
Gultekin Özsoyoglu, Joel Kraft, Veli Hakkoyma...