Sciweavers

20878 search results - page 3951 / 4176
» Database
Sort
View
129
Voted
BTW
2007
Springer
142views Database» more  BTW 2007»
15 years 9 months ago
Getting Prime Cuts from Skylines over Partially Ordered Domains
: Skyline queries have recently received a lot of attention due to their intuitive query formulation: users can state preferences with respect to several attributes. Unlike numeric...
Wolf-Tilo Balke, Wolf Siberski, Ulrich Güntze...
BTW
2007
Springer
108views Database» more  BTW 2007»
15 years 9 months ago
Kosten und Nutzen von Datenbankreorganisationen: Grundlagen, Modelle, Leistungsuntersuchungen
: Stetig wachsende Datenmengen und hohe Verfügbarkeitsanforderungen an Datenbanken führen dazu, dass Wartungsarbeiten (wie z.B. Datenbankreorganisationen) oft nicht mehr (oder ni...
Stefan Dorendorf
111
Voted
BTW
2007
Springer
100views Database» more  BTW 2007»
15 years 9 months ago
On Deriving Net Change Information From Change Logs - The DELTALAYER-Algorithm
: The management of change logs is crucial in different areas of information systems like data replication, data warehousing, and process management. One barrier that hampers the (...
Stefanie Rinderle, Martin Jurisch, Manfred Reicher...
146
Voted
CAISE
2007
Springer
15 years 9 months ago
Declarative XML Data Cleaning with XClean
Data cleaning is the process of correcting anomalies in a data source, that may for instance be due to typographical errors, or duplicate representations of an entity. It is a cruc...
Melanie Weis, Ioana Manolescu
107
Voted
CCS
2007
ACM
15 years 9 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
« Prev « First page 3951 / 4176 Last » Next »