Sciweavers

2067 search results - page 88 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
RAID
2010
Springer
15 years 2 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ICDE
2008
IEEE
147views Database» more  ICDE 2008»
16 years 5 months ago
Flow Algorithms for Parallel Query Optimization
In this paper we address the problem of minimizing the response time of a multi-way join query using pipelined (inter-operator) parallelism, in a parallel or a distributed environ...
Amol Deshpande, Lisa Hellerstein
SIGMOD
2007
ACM
186views Database» more  SIGMOD 2007»
16 years 4 months ago
Fg-index: towards verification-free query processing on graph databases
Graphs are prevalently used to model the relationships between objects in various domains. With the increasing usage of graph databases, it has become more and more demanding to e...
James Cheng, Yiping Ke, Wilfred Ng, An Lu
BNCOD
2004
106views Database» more  BNCOD 2004»
15 years 5 months ago
Language Bindings for Spatio-Temporal Database Programming in Tripod
While there are many proposals for spatio-temporal data models and query languages, there is a lack of research into application development using spatio-temporal database systems....
Tony Griffiths, Norman W. Paton, Alvaro A. A. Fern...
ICDE
2009
IEEE
200views Database» more  ICDE 2009»
16 years 6 months ago
Adaptive Scheduling of Web Transactions
In highly interactive dynamic web database systems, user satisfaction determines their success. In such systems, userrequested web pages are dynamically created by executing a numb...
Shenoda Guirguis, Mohamed A. Sharaf, Panos K. Chry...