Sciweavers

1967 search results - page 45 / 394
» The Case for Determinism in Database Systems
Sort
View
JNCA
2006
86views more  JNCA 2006»
14 years 11 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
KDD
1998
ACM
160views Data Mining» more  KDD 1998»
15 years 3 months ago
Algorithms for Characterization and Trend Detection in Spatial Databases
1 The number and the size of spatial databases, e.g. for geomarketing, traffic control or environmental studies, are rapidly growing which results in an increasing need for spatial...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...
ICSM
2005
IEEE
15 years 4 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
GIS
2008
ACM
16 years 5 days ago
Should SDBMS support a join index?: a case study from CrimeStat
Given a spatial crime data warehouse, that is updated infrequently and a set of operations O as well as constraints of storage and update overheads, the index type selection probl...
Pradeep Mohan, Ronald E. Wilson, Shashi Shekhar, B...
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 5 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...