Sciweavers

1391 search results - page 45 / 279
» Ensuring data integrity in storage: techniques and applicati...
Sort
View
KDD
2000
ACM
110views Data Mining» more  KDD 2000»
15 years 3 months ago
An empirical analysis of techniques for constructing and searching k-dimensional trees
Affordable, fast computers with large memories have lessened the demand for program efficiency, but applications such as browsing and searching very large databases often have rat...
Douglas A. Talbert, Douglas H. Fisher
TODS
2012
13 years 2 months ago
A survey of B-tree logging and recovery techniques
B-trees have been ubiquitous in database management systems for several decades, and they serve in many other storage systems as well. Their basic structure and their basic operat...
Goetz Graefe
AHS
2006
IEEE
86views Hardware» more  AHS 2006»
15 years 5 months ago
An Efficient Technique for Preventing Single Event Disruptions in Synchronous and Reconfigurable Architectures
This paper presents a unique SEU (single Event Upset) mitigation technique based upon Temporal Data Sampling for synchronous circuits and configuration bit storage for programmabl...
Sajid Baloch, Tughrul Arslan, Adrian Stoica
JUCS
2007
108views more  JUCS 2007»
14 years 11 months ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani
SSDBM
2008
IEEE
90views Database» more  SSDBM 2008»
15 years 6 months ago
Ontology Database: A New Method for Semantic Modeling and an Application to Brainwave Data
We propose an automatic method for modeling a relational database that uses SQL triggers and foreign-keys to efficiently answer positive semantic queries about ground instances for...
Paea LePendu, Dejing Dou, Gwen A. Frishkoff, Jiawe...