نتایج جستجو برای: operational database

تعداد نتایج: 342055  

2005
Ismail O. Hababeh Nicholas Bowring Muthu Ramachandran

The fragment allocation design is an essential issue that improves the performance of the applications processing in the Distributed Database systems (DDBs). The database queries access the applications on the distributed database sites and should be performed effectively. Therefore, the fragments that accessed by queries are needed to be allocated to the DDBs sites so as to reduce the communic...

1994
V. Constantinidis

An early recovery protocol that was investigated at length and is currently implemented in most commercial Distributed Database Management System products is the two-phase commit protocol. However, there is one main drawback in using this, namely blocking, that is, operational sites having to wait for the recovery of a failed site in order to complete a transaction. The two-phase commit protoco...

2009
Bashir Ahmad Nazir Ahmad Bhat

Discuses the design and development of a database created for storage and retrieval of information about individual journal articles published in about 138 Indian and foreign current journals, 28455 journal issues existing in the back files section and full text of 356 theses available in electronic format at the Sher-e-Kashmir University of Agricultural Sciences and Technology of Kashmir (SKUA...

2013
Swati Gupta Frans Alexander Henskens Michael Richard Carlos F. Alastruey Federico Fariña Jose Ramon Gonzalez Mehdi Hashemzadeh Nacer Farajzadeh Abolfazl T. Haghighat Kunal Talwar Morteza Mousakhani

Distributed database system provides resource sharing environment for optimal performance of various database activities, especially when data is spread over a large number of sites. Distributed nature of transactions occurring at different sites and requiring resources from diverse sites pose various operational problems, such as deadlocks, concurrency and data recovery. A deadlock may occur w...

1998
Matteo Golfarelli Stefano Rizzi

Though designing a data warehouse requires techniques completely different from those adopted for operational systems, no significant effort has been made so far to develop a complete and consistent design methodology for data warehouses. In this paper we outline a general methodological framework for data warehouse design, based on our Dimensional Fact Model (DFM). After analyzing the existing...

2014
Olumuyiwa Matthew Carl Dudley Robert Moreton

A Multi-tenant database (MTD) is a way of deploying a Database as a Service (DaaS). This is gaining momentum with significant increase in the number of organizations ready to take advantage of the technology. A multi-tenant database refers to a principle where a single instance of a Database Management System (DBMS) runs on a server, serving multiple clients organizations (tenants). This is a d...

2006
Peter Eric Allaby

....................................................................................................iii Acknowledgements........................................................................................v Table of

2003
Erhard Rahm

‹ Clinical trial groups (lymphoma, sepsis networks) Tight integration (Direct operation on database) File-based exchange (Data ex-/import to/from tools) Transparent integration (Data access using database API) Probe and gene intensities Sample & Experiment annotations Gene annotations Uniform web-based GUI ‹ Existing tools + own developments ¾ArrayAnalyzer server ¾Statistical algorithms(WG3) ¾C...

2007
Yan Wang Yuchun Pan Bojie Yan Anyun Li Jihua Wang

To address security of farm produce’s quality, using object-oriented technologies to build multi-purpose database, it meets the current and future data needs of a variety of operational systems. Further, base on WebGIS, to establish management and decision-making system for producing area, This system could be implement digital management for the entire agricultural park, and evaluate individua...

Journal: :Telecommunication Systems 2011
Javier Galbally Julian Fiérrez Fernando Alonso-Fernandez Marcos Martinez-Diaz

The vulnerabilities of fingerprint-based recognition systems to direct attacks with and without the cooperation of the user are studied. Two different systems, one minutiae-based and one ridge feature-based, are evaluated on a database of real and fake fingerprints. Based on the fingerprint images quality and on the results achieved on different operational scenarios, we obtain a number of stat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید