Sciweavers

1830 search results - page 303 / 366
» Implementing a Tamper-Evident Database System
Sort
View
OTM
2009
Springer
15 years 7 months ago
The Constellation Query Language
Collaboration in modeling is essential to success, but ORM diagrams intimidate many business people, and most would never install an ORM modeling tool on their computers. The Const...
Clifford Heath
VLDB
2001
ACM
66views Database» more  VLDB 2001»
15 years 5 months ago
An Evaluation of Generic Bulk Loading Techniques
Bulk loading refers to the process of creating an index from scratch for a given data set. This problem is well understood for B-trees, but so far, non-traditional index structure...
Jochen Van den Bercken, Bernhard Seeger
108
Voted
EUROSYS
2009
ACM
15 years 9 months ago
xCalls: safe I/O in memory transactions
Memory transactions, similar to database transactions, allow a programmer to focus on the logic of their program and let the system ensure that transactions are atomic and isolate...
Haris Volos, Andres Jaan Tack, Neelam Goyal, Micha...
154
Voted
BMCBI
2010
219views more  BMCBI 2010»
14 years 7 months ago
BiologicalNetworks 2.0 - an integrative view of genome biology data
Background: A significant problem in the study of mechanisms of an organism's development is the elucidation of interrelated factors which are making an impact on the differe...
Sergey Kozhenkov, Yulia Dubinina, Mayya Sedova, Am...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
14 years 11 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...