By Topic

Database Engineering and Applications Symposium, 2003. Proceedings. Seventh International

Date 18-18 July 2003

Filter Results

Displaying Results 1 - 25 of 51
  • Proceedings International Database Engineering and Applications Symposium

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The following topics are dealt with: database engineering; database applications; data modeling, database modeling; data mining; XML data management; advanced database techniques; imprecise and temporal databases; XML data querying; Web issues; database reliability; database stability; and database security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003, Page(s):399 - 400
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Specification and management of QoS in imprecise real-time databases

    Publication Year: 2003, Page(s):192 - 201
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Real-time applications such as e-commerce, flight control, chemical and nuclear control, and telecommunication are becoming increasingly sophisticated in their data needs, resulting in greater demands for real-time data services. Since the workload of real-time databases (RTDBs), providing real-time data services, cannot be precisely predicted, they can become overloaded and thereby cause temporal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented representation and reasoning model to rewriting queries using views

    Publication Year: 2003, Page(s):407 - 408
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    We propose in this article an object-oriented approach to rewriting queries using views. Our approach aims to mitigate certain limitations of existing query rewriting approaches. Among these limitations, the inconsideration of certain types of object-oriented complex queries or the lack of uniformity of this approaches compared to the object-oriented model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic data management for location based services in mobile environments

    Publication Year: 2003, Page(s):180 - 189
    Cited by:  Papers (9)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    We characterize the dynamic data management problem for location based services (LBS) in mobile environments and devise a cost model for servicing both location independent and location dependent data. The cost analysis leads to a set of dynamic data management strategies that employs judicious caching, proactive server pushing and neighborhood replication to reduce service cost and improve respon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A portable interoperation module for workflow system

    Publication Year: 2003, Page(s):403 - 406
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    The interoperation between workflow management systems in different organization became indispensable. If the interfaces between the two have standardized specification, it will be easy to add module to workflow system. Therefore, we suggest a workflow engine independent interoperability module for workflow system using workflow interface 2. This approach will provide the portability with the inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pushing quality of service information and requirements into global query optimization

    Publication Year: 2003, Page(s):170 - 179
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    In recent years, a lot of research effort has been dedicated to the management of quality of service (QoS), mainly in the fields of telecommunication networks and multimedia systems. Emerging applications such as electronic commerce, health-care applications, digital publishing or data mining also have requirements regarding the quality of service, the cost of service, the quality of data to be de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and efficient mining of intentional knowledge of outliers

    Publication Year: 2003, Page(s):44 - 53
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    In this paper, we study in a general setting the notion of outliered patterns as intentional knowledge of outliers and algorithms to mine those patterns. Our contributions consist of a model for defining outliered patterns with the help of categorical and behavioral similarities of outliers, and efficient algorithms for mining knowledge sets of distance-based outliers and outliered patterns. Our a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in object-based notification

    Publication Year: 2003, Page(s):398 - 402
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Integrating notification with shared memory applications is an interesting problem. This paper looks at implementing notification in a shared memory, object-oriented, distributed transaction environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequent itemsets mining for database auto-administration

    Publication Year: 2003, Page(s):98 - 103
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    With the wide development of databases in general and data warehouses in particular, it is important to reduce the tasks that a database administrator must perform manually. The aim of auto-administrative systems is to administrate and adapt themselves automatically without loss (or even with a gain) in performance. The idea of using data mining techniques to extract useful knowledge for administr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing views for light-weight Web ontologies

    Publication Year: 2003, Page(s):160 - 169
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    The Semantic Web aims at easy integration and usage of content by building on a semi-structured data model where data semantics are explicitly specified through ontologies. The use of ontologies in real-world applications such as community portals has shown that a new level of data independence is required for ontology-based applications. For example, the customization of information towards the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for schema integration in heterogeneous databases

    Publication Year: 2003, Page(s):2 - 11
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (722 KB)

    Schema integration is the process by which schemata from heterogeneous databases are conceptually integrated into a single cohesive schema. In this work we propose a modeling framework for schema integration, capturing the inherent uncertainty accompanying the integration process. The model utilizes a fuzzy framework to express a confidence measure, associated with the outcome of a schema integrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating nested queries on XML data

    Publication Year: 2003, Page(s):224 - 229
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    In the past few years, much attention has been paid to the study of semistructured data, i.e., data with irregular, possibly unstable, and rapidly changing structure, and, in particular, to the study of their best-known incarnation: XML. The growing interest toward XML leaded to the definition of many querying and manipulating tools, such as the standard query language XQuery (Boag et al., 2002). ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ConfSys: the CINDI conference support system

    Publication Year: 2003, Page(s):414 - 418
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    In managing an academic conference, the program chair (PC) is required to deal with many repetitive administrative tasks such as: interaction with authors and program committee members (reviewers), paper collection, paper allocation, distributing the paper to the reviewers, collating, sorting and tabulating the evaluations, orchestrating the debate of controversial evaluation of some of the papers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bitmap techniques for optimizing decision support queries and association rule algorithms

    Publication Year: 2003, Page(s):34 - 43
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    In this paper, we discuss some new bitmap techniques for optimizing decision support queries and association rule algorithm. We first show how to use a new type of predefined bitmap join index (prejoin_bitmap_index) to efficiently execute complex decision support queries with multiple outer join operations involved and push the outer join operations from the data flow level to the bitmap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of malicious transactions in database systems

    Publication Year: 2003, Page(s):329 - 335
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Existing host-based intrusion detection systems (IDSs) use the operating system log or the application log to detect misuse or anomaly activities. These methods are not sufficient for detecting intrusion in database systems. In this paper, we describe a method for database intrusion detection by using data dependency relationships. Typically before a data item is updated in the database some other... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expressing database transactions as atomic-operations

    Publication Year: 2003, Page(s):320 - 328
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (763 KB) | HTML iconHTML

    DBMS are widely used and successfully applied to a huge range of applications. However the transaction paradigm that is, with variations like nested transactions and workflow systems, the basis for durability and correctness is poorly suited to many modern applications. Transactions do not scale well and behave poorly at high concurrency levels and in distributed systems. The atomic-operations mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operations on metamodels in the context of a UML-based metamodeling architecture

    Publication Year: 2003, Page(s):391 - 396
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    In the context of information system engineering, we propose a four-layer metamodeling architecture with a comprehensive set of operations on metamodels. Our architecture enables modelers to use a three-step modeling process: first, giving an informal description of the universe of the discourse (in terms of modeling paradigms); then, defining a corresponding UML dialect (in terms of metamodels); ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query translation from XSLT to SQL

    Publication Year: 2003, Page(s):87 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    XML has been accepted as a universal format for data interchange and publication. It can be applied in the applications in which the data of a database needs to be viewed in XML format so that the data being viewed takes more semantics and is easily understood. In these applications, the user of the data to be viewed sees only XML data, not the database. He may use XML query languages such as XSLT... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High availability solutions for transactional database systems

    Publication Year: 2003, Page(s):347 - 355
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    In our increasingly wired world, there is a stringent need for the IT community to provide uninterrupted services of networks, servers and databases. Considerable efforts, both by the industrial and academic community have been directed to this end. In this paper, we examine the requirements for high availability, measures used to express it, and approaches used to implement this for databases. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neighborhood signatures for searching P2P networks

    Publication Year: 2003, Page(s):149 - 158
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Overlay networks have received a lot of attention due to the recent widespread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through replications at numerous peers, digital content can be distributed or exchanged with high resilience and availability. However, existing P2P applications incur excessive overhead on network traffic. For example, Gnutella, which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • V2: a database approach to temporal document management

    Publication Year: 2003, Page(s):212 - 221
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Temporal document databases are interesting in a number of contexts, in general document databases as well as more specialized applications like temporal XML/Web warehouses. In order to efficiently manage temporal document versions, a temporal document database system should be employed. In this paper, we describe the V2 temporal document database system, which supports storage, retrieval, and que... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental mining of frequent patterns without candidate generation or support constraint

    Publication Year: 2003, Page(s):111 - 116
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    In this paper, we propose a novel data structure called CATS Tree. CATS Tree extends the idea of FPTree to improve storage compression and allow frequent pattern mining without generation of candidate item sets. The proposed algorithms enable frequent pattern mining with different supports without rebuilding the tree structure. Furthermore, the algorithms allow mining with a single pass over the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-resolution block storage model for database design

    Publication Year: 2003, Page(s):22 - 31
    Cited by:  Papers (5)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    We propose a new storage model called MBSM (multiresolution block storage model) for laying out tables on disks. MBSM is intended to speed up operations such as scans that are typical of data warehouse workloads. Disk blocks are grouped into "super-blocks," with a single record stored in a partitioned fashion among the blocks in a superblock. The intention is that a scan operation that needs to co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CBIR-framework: using both syntactical and semantical information for image description

    Publication Year: 2003, Page(s):385 - 390
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Content-based image retrieval systems can use classification or indexing based on syntactical and/or semantic features of images. We aim at providing a framework, which can be instantiated for each specific application: a framework, which combines syntactical and semantic information for image description. We believe that a model, which integrates syntactical and semantic descriptions, together wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.