Proceedings of the Eleventh International Conference on Data Engineering

6-10 March 1995

Filter Results

Displaying Results 1 - 25 of 68
  • Proceedings of the Eleventh International Conference on Data Engineering

    Publication Year: 1995
    Request permission for commercial reuse | |PDF file iconPDF (686 KB)
    Freely Available from IEEE
  • Mining sequential patterns

    Publication Year: 1995, Page(s):3 - 14
    Cited by:  Papers (1210)  |  Patents (101)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (796 KB)

    We are given a large database of customer transactions, where each transaction consists of customer-id, transaction time, and the items bought in the transaction. We introduce the problem of mining sequential patterns over such databases. We present three algorithms to solve this problem, and empirically evaluate their performance using synthetic data. Two of the proposed algorithms, AprioriSome a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and experimental evaluation of an information discovery mechanism for networks of autonomous database systems

    Publication Year: 1995, Page(s):15 - 24
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (924 KB)

    An approach and mechanism to support the dynamic discovery of information units within a collection of autonomous and heterogeneous database systems is described. The mechanism is based upon a core set of database constructs that characterizes object database systems, along with a set of self-adaptive heuristics employing techniques from machine learning. The approach provides an uniform framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Set-oriented mining for association rules in relational databases

    Publication Year: 1995, Page(s):25 - 33
    Cited by:  Papers (48)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (608 KB)

    Describe set-oriented algorithms for mining association rules. Such algorithms imply performing multiple joins and may appear to be inherently less efficient than special-purpose algorithms. We develop new algorithms that can be expressed as SQL queries, and discuss the optimization of these algorithms. After analytical evaluation, an algorithm named SETM emerges as the algorithm of choice. SETM u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relational database compression using augmented vector quantization

    Publication Year: 1995, Page(s):540 - 549
    Cited by:  Papers (9)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (728 KB)

    Data compression is one way to alleviate the I/O bottleneck problem faced by I/O-intensive applications such as databases. However, this approach is not widely used because of the lack of suitable database compression techniques. In this paper, we design and implement a novel database compression technique based on vector quantization (VQ). VQ is a data compression technique with wide applicabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transparent object-oriented schema change approach using view evolution

    Publication Year: 1995, Page(s):165 - 172
    Cited by:  Papers (7)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (704 KB)

    When a database is shared by many users, updates to the database schema are almost always prohibited because there is a risk of making existing application programs obsolete when they run against the modified schema. This paper addresses the problem by integrating schema evolution with view facilities. When new requirements necessitate schema updates for a particular user, the user specifies schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high performance configurable storage manager

    Publication Year: 1995, Page(s):35 - 43
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (892 KB)

    Presents the architecture of ℬeSS (Bell Laboratories Storage System)-a high-performance configurable database storage manager providing key facilities for the fast development of object-oriented, relational or home-grown database management systems. ℬeSS is based on a multi-client multi-server architecture offering distributed transaction management facilities and extensible support for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OCAM: a collaborative system for multimedia applications

    Publication Year: 1995, Page(s):551 - 553
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (256 KB)

    Software engineering tasks as design and programming require the concurrent participation of multiple users, possibly geographically dispersed. But traditional software environments have not been designed to facilitate collaborative work. In this paper we present briefly a tool for communication among many persons in which users can elaborate documents with synchronous and asynchronous interaction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A common framework for classifying and specifying deductive database updating problems

    Publication Year: 1995, Page(s):173 - 182
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (872 KB)

    We propose two interpretations of the event rules which provide a common framework for classifying and specifying deductive database updating problems such as view updating, materialized view maintenance, integrity constraints checking, integrity constraints maintenance, repairing inconsistent databases, integrity constraints satisfiability or condition monitoring. Moreover, these interpretations ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Singapore NII: building the electronic universe

    Publication Year: 1995, Page(s):351 - 352
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (80 KB)

    The National Information Infrastructure (NII) is an infrastructure consisting of efficient transport, information processing and service facilities that combine both computer and communication technologies. The needs of business and the public in general drive the definition of the infrastructure. Its goal is to increase the well-being of people as a whole. To deliver the promise of a more effecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward scalability and interoperability of heterogeneous information sources

    Publication Year: 1995, Page(s):65 - 66
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (184 KB)

    Future large and complex information systems create new challenges and opportunities for research and advanced development in data management. A brief description of Hughes research and prototype efforts to meet these challenges is summarized View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance evaluation of load balancing techniques for join operations on multicomputer database systems

    Publication Year: 1995, Page(s):44 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (656 KB)

    There has been a wealth of research in the area of parallel join algorithms. Among them, hash-based algorithms are particularly suitable for shared-nothing database systems. The effectiveness of these techniques depends on the uniformity in the distribution of the join attribute values. When this condition is not met, a severe fluctuation may occur among the bucket sizes, causing uneven workload f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An industrial perspective of software architecture

    Publication Year: 1995, Page(s):554 - 555
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (176 KB)

    The software architecture of a system describes how it is decomposed into components, how these components are interconnected, and how they communicate and interact with each other and with the environment. Software architecture represents critical, system-wide design decisions which affect quality, reconfigurability and reuse, and the cost for development and maintenance. In order to understand a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Navigation Server: a highly parallel DBMS on open systems

    Publication Year: 1995, Page(s):184 - 185
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (132 KB)

    Navigation Server was jointly developed to provide a highly scalable, high-performance parallel database server in the industry. By combining ATandT's experience in massively parallel systems, such as Teradata system, with Sybase's industry-leading open, client/server DBMS, Navigation Server was developed with some specific design objectives: Scalability. Minimizing interference by minimizing reso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new recursive subclass of domain independent formulas based on subimplication

    Publication Year: 1995, Page(s):475 - 484
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (700 KB)

    We motivate and define subimplication completion of a relational calculus query and of a general deductive database. Subimplication completion not only avoids getting unexpected answers, but also makes some domain dependent queries and databases domain independent. We define a new recursive subclass of domain independent formulas, called weakly range-restricted formulas, which is strictly larger t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A universal relation approach to federated database management

    Publication Year: 1995, Page(s):261 - 270
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (732 KB)

    We describe a manufacturing environment where, driven by market forces, organizations cooperate as well as compete with one another. We argue that a federated database system (FDBS) is appropriate for such an environment. Contrary to conventional wisdom, complete transparency, assumed desirable and mandatory in distributed database systems, is neither desirable nor feasible in this environment. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical issues for RDBMS application development

    Publication Year: 1995
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (44 KB)

    We discuss some functions of relational database management systems (RDBMS) that may help RDBMS users to increase their productivity. First, for a data dictionary, we can define each field attribute characteristic in the create table statement, such as signed, unsigned, negative, nonnegative, list or coded value, range value, default value; uppercase, lowercase or upperlow case; IDstamp value; dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prairie: A rule specification framework for query optimizers

    Publication Year: 1995, Page(s):201 - 210
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (788 KB)

    From our experience, current rule-based query optimizers do not provide a very intuitive and well-defined framework to define rules and actions. To remedy this situation, we propose an extensible and structured algebraic framework called Prairie for specifying rules. Prairie facilitates rule-writing by enabling a user to write rules and actions more quickly, correctly and in an easy-to-understand ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a full-fledged multiple DBMS

    Publication Year: 1995, Page(s):67 - 68
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (148 KB)

    We have described our design of the multiple DBMS (MDBMS). This MDBMS enables users to access data controlled by different DBMSs as if data were managed by a single DBMS. It supports facilities for SQL queries and transactions, and considers security functions. In addition, an ODBC driver at the client site has been realized to ease the development of MDBMS applications. Several popular commercial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient processing of proximity queries for large databases

    Publication Year: 1995, Page(s):147 - 154
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (512 KB)

    Emerging multimedia applications require database systems to provide support for new types of objects and to process queries that may have no parallel in traditional database applications. One such important class of queries are the proximity queries that aims to retrieve objects in the database that are related by a distance metric in a way that is specified by the query. The importance of proxim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ECA rule integration into an OODBMS: architecture and implementation

    Publication Year: 1995, Page(s):341 - 348
    Cited by:  Papers (6)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    Making a database system active entails not only the specification of expressive ECA (event-condition-action) rules, algorithms for the detection of composite events, and rule management, but also a viable architecture for rule execution that extends a passive DBMS, and its implementation. We propose an integrated active DBMS architecture for incorporating ECA rules using the Open OODB Toolkit (fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A trace-based simulation of pointer swizzling techniques

    Publication Year: 1995, Page(s):52 - 61
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (776 KB)

    Persistent object-oriented applications that traverse large object graphs can improve their performance by caching objects in main memory while they are being used. While caching offers large performance benefits, the techniques used to locate these cached objects in memory can still impede the application's performance. We present the results of a trace-based simulation study of pointer swizzling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An international Masters in Software Engineering: experience and prospects

    Publication Year: 1995, Page(s):556 - 557
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (156 KB)

    Describes our experience with a newly-established international partnership between the Software Engineering Research Center (SERC), a university-based National Science Foundation (NSF) sponsored industrial research organization in the United States and an Italian industry-university team based in Padua, Italy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable parallel query server for decision support applications

    Publication Year: 1995, Page(s):186 - 187
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (140 KB)

    Decision-support applications require the ability to query against large amounts of detailed historical data. We are exploiting parallel technology to improve query response time through query decomposition, CPU and I/O parallelism, and client/server approach. IBM System/390 Parallel Query Server is built on advanced and low-cost CMOS microprocessors for decision-support applications. We discuss o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient processing of nested fuzzy SQL queries

    Publication Year: 1995, Page(s):131 - 138
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (624 KB)

    Fuzzy databases have been introduced to deal with uncertain or incomplete information in many applications. The efficiency of processing fuzzy queries in fuzzy databases is a major concern. We provide techniques to unnest nested fuzzy queries of two blocks in fuzzy databases. We show both theoretically and experimentally that unnesting improves the performance of nested queries significantly. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.