Sciweavers

2386 search results - page 254 / 478
» Database Security 2000
Sort
View
SIGMOD
2000
ACM
212views Database» more  SIGMOD 2000»
15 years 3 months ago
SQLEM: Fast Clustering in SQL using the EM Algorithm
Clustering is one of the most important tasks performed in Data Mining applications. This paper presents an e cient SQL implementation of the EM algorithm to perform clustering in...
Carlos Ordonez, Paul Cereghini
DEXA
2000
Springer
95views Database» more  DEXA 2000»
15 years 3 months ago
Formalizing Workflows Using the Event Calculus
The event calculus is a logic programming formalism for representing events and their effects especially in database applications. This paper presents the use of the event calculus...
Nihan Kesim Cicekli, Yakup Yildirim
DEXA
2000
Springer
102views Database» more  DEXA 2000»
15 years 3 months ago
Extending the Re-use of Query Results at Remote Client Sites
In 'Associative Caching' each client computer keeps a copy of its query result sets in its own local database. The purpose is to reduce the size and frequency of queries ...
Jerome Robinson, Barry G. T. Lowden
DEXAW
2000
IEEE
149views Database» more  DEXAW 2000»
15 years 2 months ago
A Flexible Mobile-Agent Framework for Accessing Information Systems in Disconnected Computing Environments
Over the last few years, the importance of mobile computing as been steadily increasing. While it is important to provide support for accessing databases in disconnected computing...
Paulo Marques, Luís Moura Silva, Joã...
83
Voted
ICDE
2000
IEEE
82views Database» more  ICDE 2000»
15 years 2 months ago
Generalized Isolation Level Definitions
Commercial databases support different isolation levels to allow programmers to trade off consistency for a potential gain in performance. The isolation levels are defined in the ...
Atul Adya, Barbara Liskov, Patrick E. O'Neil