Sciweavers

2309 search results - page 82 / 462
» Using Meta-Structures in Database Design
Sort
View
DOLAP
2004
ACM
15 years 7 months ago
Developing a characterization of business intelligence workloads for sizing new database systems
Computer system sizing involves estimating the amount of hardware resources needed to support a new workload not yet deployed in a production environment. In order to determine th...
Ted J. Wasserman, Patrick Martin, David B. Skillic...
CIKM
2010
Springer
15 years 11 days ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...
ER
2004
Springer
163views Database» more  ER 2004»
15 years 6 months ago
From Ontology to Relational Databases
The semantic web envisions a World Wide Web in which data is described with rich semantics and applications can pose complex queries. Ontologies, a cornerstone of the semantic web,...
Anuradha Gali, Cindy X. Chen, Kajal T. Claypool, R...
VLDB
1987
ACM
66views Database» more  VLDB 1987»
15 years 5 months ago
A New Compression Method with Fast Searching on Large Databases
In this paper, a new compression method for constant removal from very large scientific and statistical databases is presented. The new method combines the best features from seve...
Jianzhong Li, Doron Rotem, Harry K. T. Wong
INFOSCALE
2007
ACM
15 years 3 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü