Sciweavers

109 search results - page 17 / 22
» Domination Normal Form - Decomposing Relational Database Sch...
Sort
View
SIGCSE
1996
ACM
163views Education» more  SIGCSE 1996»
15 years 1 months ago
Database theory in practice: learning from cooperative group projects
lhis paper describes the use of cooperative group learning concepts in support of an undergraduate database mrtnagement course that emphasizes the theoretical and practical aspect...
Suzanne W. Dietrich, Susan Darling Urban
ACSAC
2001
IEEE
15 years 1 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
JACM
2000
81views more  JACM 2000»
14 years 9 months ago
Relational queries over interpreted structures
We rework parts of the classical relational theory when the underlying domain is a structure with some interpreted operations that can be used in queries. We identify parts of the...
Michael Benedikt, Leonid Libkin
97
Voted
ER
2007
Springer
97views Database» more  ER 2007»
15 years 3 months ago
Towards Active Conceptual Modelling for Sudden Events
There are a number of issues for information systems which are required to collect data urgently that are not well accommodated by current conceptual modelling methodologies and a...
John F. Roddick, Aaron Ceglar, Denise de Vries
RSFDGRC
2011
Springer
255views Data Mining» more  RSFDGRC 2011»
14 years 12 days ago
Construction and Analysis of Web-Based Computer Science Information Networks
WINACS (Web-based Information Network Analysis for Computer Science) is a project that incorporates many recent, exciting developments in data sciences to construct a Web-based co...
Jiawei Han