The paper describes working prototypes of several possible structured audit trail (logs) storages and compares their characteristics and performance parameters. The storage receives information about the format of dat...
详细信息
ISBN:
(纸本)9789604742011
The paper describes working prototypes of several possible structured audit trail (logs) storages and compares their characteristics and performance parameters. The storage receives information about the format of data generated by daemons and its API enables queries according to individual attributes obtained by analyzing log rows. Such a system enables for creating applications, currently too difficult because of the text nature of the audit trail, such as looking for security anomalies, their correlation and statistical analysis.
In this paper, we propose a schema versioning mechanism to manage the schema evolution in temporal object-oriented databases. The schema evolution management uses an object-oriented data model that supports temporal f...
详细信息
Supplemental catalog subcollection information: American Libraries Collection; American University Library Collection; Historical Literature; Typescript; Thesis (Ph. D.)--University of Florida, 1991; Vita; Adviser: K....
详细信息
Supplemental catalog subcollection information: American Libraries Collection; American University Library Collection; Historical Literature; Typescript; Thesis (Ph. D.)--University of Florida, 1991; Vita; Adviser: K. Doty; Includes bibliographical refere
Mobiscope is a discovery service where clients submit longrunning queries to continually find sets of moving network resources within a specified area. As in moving objectdatabases (MODBMSs), moving resources adverti...
详细信息
Signature technique for multi-key indexing is proposed for flexible searching in the area of database. In this paper, the signature technique called the Join Signature file is presented to cover graph aggregation hier...
详细信息
ISBN:
(纸本)9789881701299
Signature technique for multi-key indexing is proposed for flexible searching in the area of database. In this paper, the signature technique called the Join Signature file is presented to cover graph aggregation hierarchy. The structure of Join Signature is flexible enough so that the predicate can occur at any classes in the hierarchy and the target can be anywhere in the graph aggregation hierarchy. The retrieval performance when compared with the forward and reverse traversal technique is discussed and the cost models in terms of the storage cost and the retrieval cost are then formulated using the structure explained in the research.
Knowledge discovery in database have been attracting a significant amount of research, industry attention in recent years. Process planning knowledge (PPK) is one of the most important knowledge in mechanical manufact...
详细信息
[Auto Generated] blocks transferred among processors are much denser. Transfer of data is postponed until the second phase when the relevant objects have been identified. Only the required data is transferred. The per...
详细信息
[Auto Generated] blocks transferred among processors are much denser. Transfer of data is postponed until the second phase when the relevant objects have been identified. Only the required data is transferred. The performance improvement of this strategy becomes more dramatic when complex objects are processed since they are defined in terms of many other objects, resulting in a large amount of data associated with them. By using their OIDs in the object identification phase, the unnecessary acc
While there are many proposals for spatio-temporal data models and query languages, there is a lack of research into application development using spatio-temporal database systems. This paper seeks to redress the bala...
详细信息
Moving objectdatabases have received considerable attention recently. Previous work has concentrated mainly on modeling and indexing problems, as well as query selectivity estimation. Here we introduce a novel proble...
详细信息
暂无评论