Sciweavers

2386 search results - page 247 / 478
» Database Security 2000
Sort
View
VLDB
2000
ACM
151views Database» more  VLDB 2000»
15 years 2 months ago
The TreeScape System: Reuse of Pre-Computed Aggregates over Irregular OLAP Hierarchies
We present the TreeScape system that, unlike any other system known to the authors, enables the reuse of pre-computed aggregate query results for irregular dimension hierarchies, ...
Torben Bach Pedersen, Christian S. Jensen, Curtis ...
INFOCOM
2000
IEEE
15 years 3 months ago
Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management
Abstract—In this paper, we present the implementation issues of a virtual backbone that supports the operations of the Uniform Quorum System (UQS) and the Randomized Database Gro...
Ben Liang, Zygmunt J. Haas
SIGMOD
2000
ACM
141views Database» more  SIGMOD 2000»
15 years 3 months ago
Counting, Enumerating, and Sampling of Execution Plans in a Cost-Based Query Optimizer
Testing an SQL database system by running large sets of deterministic or stochastic SQL statements is common practice in commercial database development. However, code defects oft...
Florian Waas, César A. Galindo-Legaria
ER
2000
Springer
105views Database» more  ER 2000»
15 years 2 months ago
TBE: Trigger-By-Example
One of the obstacles that hinder database trigger systems from their wide deployment is the lack of tools that aid users in creating trigger rules. Similar to understanding and spe...
Dongwon Lee, Wenlei Mao, Wesley W. Chu
ISMIR
2000
Springer
176views Music» more  ISMIR 2000»
15 years 2 months ago
SEMEX - An efficient Music Retrieval Prototype
We present an efficient prototype for music information retrieval. The prototype uses bitparallel algorithms for locating transposition invariant matches of monophonic query melod...
Kjell Lemström, S. Perttu