Sciweavers

2386 search results - page 132 / 478
» Database Security 2000
Sort
View
ISMIS
2000
Springer
15 years 6 months ago
Top-Down Query Processing in First Order Deductive Databases under the DWFS
A top-down query processing method for first order deductive databases under the disjunctive well-founded semantics (DWFS) is presented. The method is based upon a characterisation...
C. A. Johnson
VLDB
2000
ACM
136views Database» more  VLDB 2000»
15 years 6 months ago
Managing Intervals Efficiently in Object-Relational Databases
Modern database applications show a growing demand for efficient and dynamic management of intervals, particularly for temporal and spatial data or for constraint handling. Common...
Hans-Peter Kriegel, Marco Pötke, Thomas Seidl
WEBDB
2000
Springer
135views Database» more  WEBDB 2000»
15 years 6 months ago
Active Query Caching for Database Web Servers
A substantial portion of web traffic consists of queries to database web servers. Unfortunately, a common technique to improve web scalability, proxy caching, is ineffective for da...
Qiong Luo, Jeffrey F. Naughton, Rajasekar Krishnam...
COLING
2000
15 years 4 months ago
Querying Temporal Databases Using Controlled Natural Language
Recent years have shown a surge in interest in temporal database systems, which allow users to store time-dependent intbrmation. We present a novel controlled natural language int...
Rani Nelken, Nissim Francez
OSDI
2000
ACM
15 years 4 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro