Proceedings of the Twelfth International Conference on Data Engineering

26 Feb.-1 March 1996

Filter Results

Displaying Results 1 - 25 of 80
  • IN MEMORIAM James Clifford

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • IN MEMORIAM Gennady Antoshenkov

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Are we moving toward an information superhighway or a Tower of Babel? The challenge of large-scale semantic heterogeneity

    Publication Year: 1996, Page(s):2 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (750 KB)

    The popularity and growth of the "information superhighway" have dramatically increased the number of information sources available for use. Unfortunately, there are significant challenges to be overcome. One particular problem is context interchange, whereby each source of information and potential receiver of that information may operate with a different context, leading to large-scale semantic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying a flexible OODBMS-IRS-coupling to structured document handling

    Publication Year: 1996, Page(s):10 - 19
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1036 KB)

    In document management systems, it is desirable to provide content-based access to documents going beyond regular expression search in addition to access based on structural characteristics or associated attributes. We present a new approach for coupling OODBMSs (object-oriented database management systems) and IRSs (information retrieval systems) that provides enhanced flexibility and functionali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A log-stuctured organization for tertiary storage

    Publication Year: 1996, Page(s):20 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB)

    We present the design of a log-structured tertiary storage (LTS) system. The advantage of this approach is that it allows the system to hide the details of jukebox robotics and media characteristics behind a uniform, random-access, block-oriented interface. It also allows the system to avoid media mount operations for writes, giving a write performance similar to that of secondary storage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure mediated databases

    Publication Year: 1996, Page(s):28 - 37
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1001 KB)

    With the evolution of the information superhighway, there is now an immense amount of information available in a wide variety of databases. Furthermore, users often have the ability to access legacy software packages developed by external sources. However, sometimes both the information provided by a data source, as well as one or more of the functions available through a software package may be s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authorization and access control in IRO-DB

    Publication Year: 1996, Page(s):40 - 47
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (719 KB)

    The paper describes authorization and access control in the IRO-DB database system, a system supporting interoperable access between relational and object oriented databases. The security policy developed is a federated administrative discretionary access control policy which supports positive, negative, as well as implied authorization, includes a procedure for conflict resolution within the set ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query folding

    Publication Year: 1996, Page(s):48 - 55
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (779 KB)

    Query folding refers to the activity of determining if and how a query can be answered using a given set of resources, which might be materialized views, cached results of previous queries, or queries answerable by other databases. We investigate query folding in the context where queries and resources are conjunctive queries. We develop an exponential time algorithm that finds all complete or par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A toolkit for constraint management in heterogeneous information systems

    Publication Year: 1996, Page(s):56 - 65
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1259 KB)

    We present a framework and a toolkit to monitor and enforce distributed integrity constraints in loosely coupled heterogeneous information systems. Our framework enables and formalizes weakened notions of consistency, which are essential in such environments. Our framework is used to describe: interfaces provided by a database for the data items involved in inter site constraints; strategies for m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the performance of multi-dimensional access structures based on k-d-trees

    Publication Year: 1996, Page(s):68 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB)

    In recent years, various k-d-tree based multidimensional access structures have been proposed. All these structures share an average bucket utilization of at most ln 2/spl ap/69.3%. We present two algorithms which perform local redistributions of objects to improve the storage utilization of these access structures. We show that under fair conditions a good improvement algorithm can save up to 20%... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HiTi graph model of topographical road maps in navigation systems

    Publication Year: 1996, Page(s):76 - 84
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (865 KB)

    In navigation systems, a primary task is to compute the minimum cost route from the current location to the destination. One of the major problems for navigation systems is that a significant amount of computation time is required to find a minimum cost path when the topographical road map is large. Since navigation systems are real time systems, it is critical that the path be computed while sati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing retroactive and proactive versions in bi-temporal databases (2TDB)

    Publication Year: 1996, Page(s):85 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (995 KB)

    Bi temporal databases allow users to record retroactive (past) and proactive (future planned) versions of an entity, and to retrieve the appropriate versions for bi temporal queries that involve both valid time and transaction time. Currently used timestamp representations are mainly for either valid time or transaction time databases. We first categorize the types of problems that can occur in ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining knowledge rules from databases: a rough set approach

    Publication Year: 1996, Page(s):96 - 105
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (913 KB)

    The principle and experimental results of an attribute oriented rough set approach for knowledge discovery in databases are described. Our method integrates the database operation, rough set theory and machine learning techniques. In this method the learning procedure consists of two phases: data generalization and data reduction. In the data generalization phase, attribute oriented induction is p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintenance of discovered association rules in large databases: an incremental updating technique

    Publication Year: 1996, Page(s):106 - 114
    Cited by:  Papers (203)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    An incremental updating technique is developed for maintenance of the association rules discovered by database mining. There have been many studies on efficient discovery of association rules in large databases. However, it is nontrivial to maintain such discovered rules in large databases because a database may allow frequent or occasional updates and such updates may not only invalidate some exi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge discovery from telecommunication network alarm databases

    Publication Year: 1996, Page(s):115 - 122
    Cited by:  Papers (34)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB)

    A telecommunication network produces daily large amounts of alarm data. The data contains hidden valuable knowledge about the behavior of the network. This knowledge can be used in filtering redundant alarms, locating problems in, the network, and possibly in predicting severe faults. We describe the TASA (Telecommunication Network Alarm Sequence Analyzer) system for discovering and browsing knowl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An executable graphical representation of mediatory information systems

    Publication Year: 1996, Page(s):124 - 131
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    We present an approach towards a unified modeling and query processing tool for mediatory information systems. Based upon coloured Petri nets we are able to model the integration of parametric data (external, uncertain and temporal information) and to visualize the dataflow in mediatory information systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MedMaker: a mediation system based on declarative specifications

    Publication Year: 1996, Page(s):132 - 141
    Cited by:  Papers (25)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1130 KB)

    Mediators are used for integration of heterogeneous information sources. We present a system for declaratively specifying mediators. It is targeted for integration of sources with unstructured or semi-structured data and/or sources with changing schemas. We illustrate the main features of the Mediator Specification Language (MSL), show how they facilitate integration, and describe the implementati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A directory service for a federation of CIM databases with migrating objects

    Publication Year: 1996, Page(s):142 - 150
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (797 KB)

    We propose a novel directory scheme for a large federation of databases where object migration is in response to manufacturing events. In our directory scheme, objects report their location to a directory server instead of the traditional method of the directory servers polling sites in the network. The directory is distributed among multiple servers to avoid bottlenecks during query processing. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data cube: a relational aggregation operator generalizing GROUP-BY, CROSS-TAB, and SUB-TOTALS

    Publication Year: 1996, Page(s):152 - 159
    Cited by:  Papers (190)  |  Patents (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (718 KB)

    Data analysis applications typically aggregate data across many dimensions looking for unusual patterns. The SQL aggregate functions and the GROUP BY operator produce zero-dimensional or one-dimensional answers. Applications need the N-dimensional generalization of these operators. The paper defines that operator, called the data cube or simply cube. The cube operator generalizes the histogram, cr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Microsoft relational engine

    Publication Year: 1996, Page(s):160 - 161
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB)

    Microsoft offers three very successful database products, FoxPro, Access and SQL Server. While SQL Server excels in multi-user transaction performance, Access and its underlying Jet engine excel as an end-user and development tool for desktop and client-server applications. One of our top priorities is to improve the integration of these two products. With respect to their query processing capabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transaction coordination for the new millennium: SQL Server meets OLE transactions

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB)

    Summary form only given, as follows. Computing hardware is now available at a price, performance, and reliability point such that enterprise computing tasks may be performed on "commodity" class machines. These economic benefits have been achieved through producing large numbers of systems from standardized components. The OLE Transaction Architecture defines a set of distributed component object ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search and ranking algorithms for locating resources on the World Wide Web

    Publication Year: 1996, Page(s):164 - 171
    Cited by:  Papers (13)  |  Patents (78)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (795 KB)

    Applying information retrieval techniques to the World Wide Web (WWW) environment is a challenge, mostly because of its hypertext/hypermedia nature and the richness of the meta-information it provides. We present four keyword-based search and ranking algorithms for locating relevant WWW pages with respect to user queries. The first algorithm, Boolean Spreading Activation, extends the notion of wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Gold Text Indexing Engine

    Publication Year: 1996, Page(s):172 - 179
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1061 KB)

    The proliferation of electronic communication including computer mail, faxes, voice mail, and net news has led to a variety of disjoint applications and usage paradigms that forces users to deal with multiple different user interfaces and access related information arriving over the different communication media separately. To enable users to cope with the overload of information arriving over het... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speculative data dissemination and service to reduce server load, network traffic and service time in distributed information systems

    Publication Year: 1996, Page(s):180 - 187
    Cited by:  Papers (34)  |  Patents (58)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (978 KB)

    We present two server-initiated protocols to improve the performance of distributed information systems (e.g. WWW). Our first protocol is a hierarchical data dissemination mechanism that allows information to propagate from its producers to servers that are closer to its consumers. This dissemination reduces network traffic and balances load amongst servers by exploiting geographic and temporal lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DB2 LOBs: the teenage years

    Publication Year: 1996, Page(s):192 - 199
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (854 KB)

    Previous versions of DB2 Common Server had large objects (LOBs) that were neither large nor functional. Their size was limited to 32,700 bytes and, until recently when support for SUBSTR and CONCAT was added, there was no function available on these objects at all. DB2 LOBs were infants. However, with the latest release of DB2 Common Server, Version 2.1, LOBs have matured considerably supporting s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.