Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

[1990] Proceedings. Sixth International Conference on Data Engineering

5-9 Feb. 1990

Filter Results

Displaying Results 1 - 25 of 66
  • Sixth International Conference on Data Engineering (Cat. No.90CH2840-7)

    Publication Year: 1990
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • The fingerprinted database

    Publication Year: 1990, Page(s):330 - 336
    Cited by:  Papers (37)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    A fingerprinting database management system presents a unique version or view of the data to each user. The view contains small pseudorandom modifications to selected data items. The objective of this system is to identify users who divulge proprietary information which they have obtained through legitimate access. Even if the user makes further modifications to the data before its misuse, a stati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The grid protocol: a high performance scheme for maintaining replicated data

    Publication Year: 1990, Page(s):438 - 445
    Cited by:  Papers (66)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    A protocol for maintaining replicated data that can provide both high data availability and low response time is presented. Existing protocols are designed primarily to achieve high availability by updating a large fraction of the copies, which provides some (although not significant) load sharing. In the new protocol, transaction processing is shared effectively among nodes storing copies of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based language for deductive object-oriented databases

    Publication Year: 1990, Page(s):58 - 67
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    A deductive rule-based language for object-oriented databases is presented. A deductive rule in this language derives new patterns of associations among objects of some selected classes if these objects fall in certain `base' on other derived patterns. The patterns of object associations derived by a rule are held in a subdatabase whose intention consists of some selected classes and their associa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The semantic data model for security: representing the security semantics of an application

    Publication Year: 1990, Page(s):322 - 329
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    Data security requirements go beyond traditional access control considerations to include relationships among data that must be protected. The author extends the data-modeling concepts to include the secrecy properties of data. The semantic data model for security (SDMS) is proposed as the vehicle for users, database designers and security officers to analyze and understand the security requiremen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with distributed query processing

    Publication Year: 1990, Page(s):192 - 199
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (952 KB)

    Different implementations of an experimental distributed query processing system which is constructed on top of existing database management systems (DBMSs) are presented. A performance evaluation is carried out. It is shown that the response times of query execution are affected significantly by the degree of site autonomy, interferences among processes, interface with the local DBMSs, and commun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed RAID-a new multiple copy algorithm

    Publication Year: 1990, Page(s):430 - 437
    Cited by:  Papers (45)  |  Patents (89)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    A new multicopy algorithm is proposed; it has the potentially attractive property that much less space is required and equal performance is provided during normal operation. On the other hand, during failures the new algorithm offers lower performance than a conventional scheme. As such, this algorithm may be attractive in various multicopy environments, as well as in disaster recovery. The algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access invariance and its use in high contention environments

    Publication Year: 1990, Page(s):47 - 55
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Various factors suggest that data contention may be of increasing significance in transaction processing systems. One approach to this problem is to run transactions twice, the first time without making any changes to the database. Benefits may result either from data prefetching during the first execution or from determining the locks required for purposes of scheduling. Consideration is given to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial search with polyhedra

    Publication Year: 1990, Page(s):311 - 319
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Range searches in multidimensional space have been studied extensively, and several excellent search structures have been devised. However, all of these require that the ranges in the different dimensions be specified independently. In other words, only rectangular regions can be specified and searched for. Similarly, nonpoint objects can be indexed only in terms of their bounding rectangles. Howe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithmic basis for integrating production systems and large databases

    Publication Year: 1990, Page(s):353 - 360
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    Executing a large number of transactions on a large database within a short amount of time is computationally stressful. Main-memory resident production systems have been made computationally feasible by the development of incremental match algorithms that exploit the temporal redundancy of the database by saving results computed in prior cycles. Unfortunately, the worst-case space complexity of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending object-oriented concepts to support engineering applications

    Publication Year: 1990, Page(s):220 - 227
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    A presentation is made of a structure-function (S-F) paradigm for representing engineering designs. The S-F paradigm treats structures and functions as first-class objects by modeling the physical configuration of the design as structural objects and the behavior of the design as functional objects. The paradigm supports engineering designs by using the associative knowledge between structures and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Currency-based updates to distributed materialized views

    Publication Year: 1990, Page(s):512 - 520
    Cited by:  Papers (7)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    In currency-based updates, processing a query to a materialized view has to satisfy a currency constraint which specifies the maximum time lag of the view data with respect to a transaction database. Currency-based update policies are more general than periodical, deferred, and immediate updates; they provide additional opportunities for optimization and allow updating a materialized view from oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental evaluation of concurrent checkpointing and rollback-recovery algorithms

    Publication Year: 1990, Page(s):182 - 189
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    The performance of two distributed checkpointing and recovery algorithms, the synchronous checkpointing algorithm (SA) and the independent checkpointing algorithm (ICA), is evaluated. The performance is based on a detailed implementation of algorithms published earlier in the C language. A benchmark that simulates a variety of application requirements and considers variations in the number of proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended relations

    Publication Year: 1990, Page(s):488 - 494
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    A description is given of extended relations, a generalization of ordinary relations in which tuple identifiers (tids) can appear as attribute values. The relational algebra is extended to include new operators that manipulate these tids; the resulting algebra is called the tid-algebra. The theorems of the tid-algebra are shown to provide a formal basis for optimizer transformations that involve h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shared conceptual schema for four medical expert systems

    Publication Year: 1990, Page(s):410 - 419
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB)

    The fundamental reason for database management systems is the support of applications using shared overlapping sets of data through external views of an underlying conceptual schema. The definition of such a schema for expert systems (ESs) is a topic of interest to database researchers both as a proof that ESs can be supported and as an exploration of the process of view integration. A shared conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A paradigm for concurrency control in heterogeneous distributed database systems

    Publication Year: 1990, Page(s):37 - 46
    Cited by:  Papers (27)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    A heterogeneous distributed databases system (HDDBS) is a system which integrates preexisting databases to support global applications accessing more than one database. An outline of approaches to concurrency control in HDDBSs is presented. The top-down approach emerges as a viable paradigm for ensuring the proper concurrent execution of global transactions in an HDDBS. The primary contributions o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A query algebra for object-oriented databases

    Publication Year: 1990, Page(s):154 - 162
    Cited by:  Papers (50)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    An algebra that synthesizes relational query concepts with object-oriented databases is defined. The algebra fully supports abstract data types and object identity, while providing associative access to objects. The operations take an abstract view of objects and access typed collections of objects through the public interface defined for the type. The algebra supports access to relationships impl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selectivity estimation using homogeneity measurement

    Publication Year: 1990, Page(s):304 - 310
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    A new approach is presented for organizing a large collection of multidimensional data with an unknown distribution by partitioning the data such that the data are relatively homogeneously distributed in each block. A multidimensional tree is generated according to this partition. After the tree is generated, summary data estimation such as selectively estimation can be performed via a tree search... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelism in database production systems

    Publication Year: 1990, Page(s):121 - 128
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    A study is made of the issues in parallelizing database production systems. Various kinds of parallelism possible in production systems are classified. Parallel execution of production systems leads to some subtle problems which, if not handled carefully, can cause altered execution semantics. The precise conditions that any parallel implementation of production systems must fulfil in order to be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative approach to large knowledge based systems

    Publication Year: 1990, Page(s):346 - 352
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Conventional expert systems based on a single flat knowledge base have fared well in solving a narrow range of problems. Their architectures, however, do not extend to large applications like automated factories, which require multidisciplinary knowledge and are geographically distributed. To solve multidisciplinary problems, a knowledge-based system must be able to: reason about the need for coop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chained declustering: a new availability strategy for multiprocessor database machines

    Publication Year: 1990, Page(s):456 - 465
    Cited by:  Papers (76)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB)

    A new strategy for increasing the availability of data in multiprocessor, shared-nothing database machines is presented. This technique, termed chained declustering, is demonstrated to provide superior performance in the event of failures while maintaining a very high degree of data availability. Furthermore, unlike most earlier replication strategies, the implementation of chained declustering re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelism in object-oriented query processing

    Publication Year: 1990, Page(s):209 - 217
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB)

    An investigation of parallel query processing issues in object-oriented databases is conducted. First the query model to be used is introduced. Three areas in which parallelism can be exploited in the query model are identified. The performance of each of the three areas is measured by mapping the query model to a parallel architecture and using analytic comparisons with the case in which query pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bill-of-material configuration generation

    Publication Year: 1990, Page(s):237 - 244
    Cited by:  Papers (4)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    A novel system which combines elements of database management, object-oriented technology and artificial intelligence is described. This system addresses certain bill-of-material (BOM) configuration generation problems and should not be confused with the more typical BOM recursive traversal problems. The BOM configuration system automatically extracts design rules from existing BOM designs. The sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute inheritance implemented on top of a relational database system

    Publication Year: 1990, Page(s):503 - 509
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    An implementation technique which solves integrity checking, query evaluation, and transaction synchronization tasks in database systems with multiple attribute inheritance and uses the support of a relational database system is presented. It is shown how to implement an integrity checker and a transaction synchronization component of a database system with attribute inheritance. The basic idea is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost of distributed deadlock detection: a performance study

    Publication Year: 1990, Page(s):174 - 181
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    A performance evaluation of two classes of distributed deadlock detection algorithms, namely, set-based and probe-based distributed deadlock detection algorithms, is presented. The performance evaluation is performed on a simulated distributed database by implementing the algorithms. The performance evaluation shows two main results. First, set-based algorithms outperform probe-based algorithms. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.