Sciweavers

912 search results - page 142 / 183
» Optimizing Timestamp Management in Data Stream Management Sy...
Sort
View
124
Voted
DEXAW
1997
IEEE
86views Database» more  DEXAW 1997»
15 years 7 months ago
Log-Only Temporal Object Storage
As main memory capacity increases, more of the database read requests will be satis ed from the bu er system. Consequently, the amount of disk write operations relative to disk re...
Kjetil Nørvåg, Kjell Bratbergsengen
EDBT
2010
ACM
151views Database» more  EDBT 2010»
15 years 8 months ago
Warm cache costing: a feedback optimization technique for buffer pool aware costing
Most modern RDBMS depend on the query processing optimizer’s cost model to choose the best execution plan for a given query. Since the physical IO (PIO) is a costly operation to...
H. S. Ramanujam, Edwin Seputis
CSREASAM
2010
15 years 1 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
NATO
1993
15 years 7 months ago
METU Object-Oriented DBMS
METU Object-Oriented DBMS 1 includes the implementation of a database kernel, an object-oriented SQL-like language and a graphical user interface. Kernel functions are divided bet...
Asuman Dogac, Cetin Ozkan, Ismailcem Budak Arpinar...
159
Voted
CIKM
2003
Springer
15 years 8 months ago
Building XML statistics for the hidden web
There have been several techniques proposed for building statistics for static XML data. However, very little work has been done in the area of building XML statistics for data so...
Ashraf Aboulnaga, Jeffrey F. Naughton