Sciweavers

1830 search results - page 243 / 366
» Implementing a Tamper-Evident Database System
Sort
View
93
Voted
CORR
2007
Springer
151views Education» more  CORR 2007»
15 years 24 days ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont
ICDE
2008
IEEE
112views Database» more  ICDE 2008»
16 years 2 months ago
XML Index Recommendation with Tight Optimizer Coupling
XML database systems are expected to handle increasingly complex queries over increasingly large and highly structured XML databases. An important problem that needs to be solved ...
Iman Elghandour, Ashraf Aboulnaga, Daniel C. Zilio...
108
Voted
ADC
1999
Springer
97views Database» more  ADC 1999»
15 years 5 months ago
Pseudo-Naive Evaluation
We introduce pseudo-naive evaluation, a method for execution of mixed top-down/bottom-up logic programs and deductive databases. The method is intermediate in power between naive ...
Donald A. Smith, Mark Utting
103
Voted
USENIX
2007
15 years 3 months ago
Hyperion: High Volume Stream Archival for Retrospective Querying
Network monitoring systems that support data archival and after-the-fact (retrospective) queries are useful for a multitude of purposes, such as anomaly detection and network and ...
Peter Desnoyers, Prashant J. Shenoy
IRI
2007
IEEE
15 years 7 months ago
SRG: A Digital Document-Enhanced Service Oriented Research Grid
We describe a new framework for building a system that consists of tools and services for supporting Cyberinfrastructure based scientific research. This system, called the Semanti...
Geoffrey Fox, Ahmet Fatih Mustacoglu, Ahmet E. Top...