Sciweavers

1830 search results - page 275 / 366
» Implementing a Tamper-Evident Database System
Sort
View
109
Voted
DAWAK
2003
Springer
15 years 6 months ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
116
Voted
SBBD
2004
137views Database» more  SBBD 2004»
15 years 2 months ago
A Lock Manager for Collaborative Processing of Natively Stored XML Documents
Today, neither transactional provisions, in general, nor concurrency control, in particular, of DBMS-based processing are tailored to the specific needs of large and collaborative...
Michael Peter Haustein, Theo Härder
VLDB
2004
ACM
92views Database» more  VLDB 2004»
15 years 6 months ago
Write-Optimized B-Trees
Large writes are beneficial both on individual disks and on disk arrays, e.g., RAID-5. The presented design enables large writes of internal B-tree nodes and leaves. It supports b...
Goetz Graefe
108
Voted
ARTMED
2006
86views more  ARTMED 2006»
15 years 24 days ago
Spatiotemporal reasoning about epidemiological data
Objective. In this article, we propose new methods to visualize and reason about spatiotemporal epidemiological data. Background. Efficient computerized reasoning about epidemics ...
Peter Z. Revesz, Shasha Wu
205
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 29 days ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks