Sciweavers

1830 search results - page 268 / 366
» Implementing a Tamper-Evident Database System
Sort
View
188
Voted
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
16 years 2 months ago
Ontology-Based Constraint Recognition for Free-Form Service Requests
Automatic recognition and formalization of constraints from free-form service requests is a challenging problem. Its resolution would go a long way toward allowing users to make r...
Muhammed Al-Muhammed, David W. Embley
169
Voted
ICDE
2005
IEEE
131views Database» more  ICDE 2005»
16 years 2 months ago
Improving Preemptive Prioritization via Statistical Characterization of OLTP Locking
OLTP and transactional workloads are increasingly common in computer systems, ranging from ecommerce to warehousing to inventory management. It is valuable to provide priority sch...
David T. McWherter, Bianca Schroeder, Anastassia A...
ICDE
2002
IEEE
143views Database» more  ICDE 2002»
16 years 2 months ago
Declarative Composition and Peer-to-Peer Provisioning of Dynamic Web Services
The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations...
Boualem Benatallah, Quan Z. Sheng, Anne H. H. Ngu,...
VLDB
2007
ACM
101views Database» more  VLDB 2007»
16 years 29 days ago
SQLB: A Query Allocation Framework for Autonomous Consumers and Providers
In large-scale distributed information systems, where participants are autonomous and have special interests for some queries, query allocation is a challenge. Much work in this c...
Jorge-Arnulfo Quiané-Ruiz, Patrick Valdurie...
187
Voted
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
16 years 27 days ago
Extensible optimization in overlay dissemination trees
We introduce XPORT, a profile-driven distributed data dissemination system that supports an extensible set of data types, profile types, and optimization metrics. XPORT efficientl...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...