Sciweavers

2386 search results - page 132 / 478
» Database Security 2000
Sort
View
ISMIS
2000
Springer
15 years 1 months ago
Top-Down Query Processing in First Order Deductive Databases under the DWFS
A top-down query processing method for first order deductive databases under the disjunctive well-founded semantics (DWFS) is presented. The method is based upon a characterisation...
C. A. Johnson
VLDB
2000
ACM
136views Database» more  VLDB 2000»
15 years 1 months ago
Managing Intervals Efficiently in Object-Relational Databases
Modern database applications show a growing demand for efficient and dynamic management of intervals, particularly for temporal and spatial data or for constraint handling. Common...
Hans-Peter Kriegel, Marco Pötke, Thomas Seidl
WEBDB
2000
Springer
135views Database» more  WEBDB 2000»
15 years 1 months ago
Active Query Caching for Database Web Servers
A substantial portion of web traffic consists of queries to database web servers. Unfortunately, a common technique to improve web scalability, proxy caching, is ineffective for da...
Qiong Luo, Jeffrey F. Naughton, Rajasekar Krishnam...
COLING
2000
14 years 11 months ago
Querying Temporal Databases Using Controlled Natural Language
Recent years have shown a surge in interest in temporal database systems, which allow users to store time-dependent intbrmation. We present a novel controlled natural language int...
Rani Nelken, Nissim Francez
OSDI
2000
ACM
14 years 11 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro