نتایج جستجو برای: systems 1 a database

تعداد نتایج: 14280546  

2003
Caixue Lin

2 Object-Oriented Data Model 3 2.1 OODB standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1.1 Manifestos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1.2 ODMG Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 Other Related Standards . . . . . . . . . . . . . . . . . . . . . ....

2003
Stavros Harizopoulos Anastasia Ailamaki

Traditional database system architectures face a rapidly evolving operating environment, where millions of users store and access terabytes of data. In order to cope with increasing demands for performance, high-end DBMS employ parallel processing techniques coupled with a plethora of sophisticated features. However, the widely adopted, work-centric, thread-parallel execution model entails seve...

2010
TAMER OZSU

The concurrency control problem in database systems has been examined by many people and several concurrency control algorithms have been proposed. The most popular concurrency controls are two-phase locking and timestamp ordering. This paper reviews both algorithms and shows that they are special cases of a more general concurrency control algorithm. This concurrency control algorithm is descr...

Journal: :Bioinformatics 2004
Dirk Steinhauser Björn Usadel Alexander Lüdemann Oliver Thimm Joachim Kopka

SUMMARY The open access comprehensive systems-biology database (CSB.DB) presents the results of bio-statistical analyses on gene expression data in association with additional biochemical and physiological knowledge. The main aim of this database platform is to provide tools that support insight into life's complexity pyramid with a special focus on the integration of data from transcript and m...

1997
Pedro R. Falcone Sampaio Norman W. Paton

Deductive object-oriented databases (DOODs) seek to combine the complementary beneets of the deductive and the object-oriented paradigms in the context of databases. Research into DOODs has now been taking place for almost ten years, and a signiicant number of designs and implementations have been developed. This paper categorises proposals for DOODs, based on the language design strategy pursu...

Journal: :Proceedings. Symposium on Computer Applications in Medical Care 1991
R Lo C Locatis E Ullmer V Carr R Banvard Q Le M Williamson M Ackerman

A working prototype database of authoring system software was developed as part of a study of authoring software conducted by the National Library of Medicine. The database and development issues ranging from the scope of the database to what information to document are described. The protype demonstrates that records of reasonable integrity can be derived from vendor supplied information as lo...

1995
Abdelkader Hameurlain Franck Morvan

The design of ESQL queries Optimizer may be decomposed into three dimensions: (i) the search space which defines the syntactic representation of all relevant aspects of an execution, (ii) the search strategy used to generate an optimal execution plan and (iii) the cost evaluator which calculates the metrics used by the search strategies. In this paper, we investigate issues involved in designin...

2010
F. J. SMITH

A text database system, often called an information retrieval system, is designed to process a text model of the data, viewed as an ordered sequence of documents, paragraphs, sentences, words (i.e., as a list structure). Although relations are sets of tuples, and therefore unordered, the relational model can still be used successfully for text, but surprisingly it is shown that at the physical ...

2005
Elisa Bertino Ji-Won Byun Ninghui Li

Privacy is today an important concern for both users and enterprises. Therefore, intense research is today being carried out on various aspects of privacy-preserving data management systems. In this paper, we focus on database management systems (DBMS) able to enforce privacy promises encoded in privacy languages such as P3P. In particular, in the paper, we first present an overview of the P3P ...

2005
Ramzi A. Haraty

There are two main types of security in database systems: discretionary security and mandatory security. Discretionary security restricts access to data items at the discretion of the owner. Most commercial database management systems (DBMS) employ some form of discretionary security by controlling access privileges and modes of data users (Griffiths & Wade, 1976). Discretionary security is not...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید