To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Contemporary storage systems separate the management of data from the management of the underlying physical storage media used to store that data. This separation is artificial an...
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
In this paper we describe the architecture and interface of KODA, a production strength database kernel. KODA is unique in the industry in its ability to support two different dat...
Background: Accurate assignment of genes to pathways is essential in order to understand the functional role of genes and to map the existing pathways in a given genome. Existing ...