Database research

Xem 1-20 trên 290 kết quả Database research
  • New Concepts such as agile modeling, extreme programming, knowledge management, and organizational memory are stimulating new research ideas amoung researchers, and prompting new applications and software. Revolution and evolution are common in the areas of information systemsdevelopment and database. Research Issues in Systems Analysis is a collection of the most up-to-date research-oriented chapters on information systems development and database.

    pdf296p suthebeo 17-07-2012 37 6   Download

  • Mourad Ouzzani Qatar Computing Research Institute Qatar Foundation Doha, Qatar mouzzani@qf.org.qa Athman Bouguettaya School of Computer Science and Information Technology RMIT University Melbourne Victoria Australia athman.bouguettaya@rmit.edu.au Library of Congress Control Number: 2011939473 c Springer Science+Business Media, LLC 2011 All rights reserved.

    pdf147p hoa_can 05-02-2013 32 10   Download

  • The purpose of this manual is to give guidance on how to use the eighth edition of the book An Introduction to Database Systems──referred to throughout the manual as simply "the book," or "this book," or "the present book," or just "the eighth edition"──as a basis for teaching a database course. The book is suitable for a primary (one- or two-semester) course at the junior or senior undergraduate or first-year graduate level; it also contains some more forward-looking and research-oriented material that would be relevant to a more advanced course....

    pdf401p nhatkyvodanh 11-08-2012 21 9   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P1:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 65 9   Download

  • Ecotourism is a concept and a fast growing segment of the tourism industry worldwide.  It  plays  an  increasingly  important  role  in  the  socio‐economic  development  of  many  districts  and  provinces in Vietnam. Therefore, it needs to be well planned and managed with the aid of spatial  information technologies such as Remote Sensing (RS), Geographic Information System (GIS) and  Global  Positioning  System  (GPS).

    pdf6p dem_thanh 22-12-2012 40 8   Download

  • Tham khảo sách 'rapid weight loss a medical dictionary, bibliography, and annotated research guide to internet references', y tế - sức khoẻ, y học thường thức phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf93p cronus75 13-01-2013 76 6   Download

  • In order to ensure the effectiveness of land use planning, the information about land quality and land characteristics plays an important role. The application of information technology is one of the best solutions in the area of land use planning in which land unit database is considered firstly and seriously. The land unit database consists of spatial data and attribute data, both of which should follow the standard.

    pdf7p dem_thanh 22-12-2012 35 4   Download

  • The existence of different autonomous Web sites containing related information has given rise to the problem of integrating these sources effectively to provide a comprehensive integrated source of relevant information. The advent of e-commerce and the increasing trend of availability of commercial data on the Web has generated the need to analyze and manipulate these data to support corporate decision making. Decision support systems now must be able to harness and analyze Web data to provide organizations with a competitive edge.

    pdf488p hotmoingay3 09-01-2013 21 5   Download

  • Object Oriented (OO) and Object-relational (OR) DBMSs showed how text and other data types can be added to a DBMS and how to extend the query language with functions that operate on these extended data types. Current database systems have taken their first steps toward supporting queries across text and structured data; but they are still inadequate for integrating structured data retrieval with the probabilistic-reasoning characteristic of information...

    pdf9p yasuyidol 02-04-2013 28 4   Download

  • The Oracle OLAP option is a full-featured on-line analytical processing (OLAP) server embedded within the Oracle Database. The Oracle OLAP option can be used to improve SQL- based business intelligence tools and applications by improving query performance and enriching them with analytic content. As an OLAP solution that is deeply embedded in the Oracle Database, the Oracle OLAP option allows centralized management of data and business rules in a secure, scalable and enterprise-ready platform..

    pdf6p yasuyidol 02-04-2013 20 4   Download

  • Oracle Partitioning enhances the data management environment for OLTP, data marts, and data warehouse applications by adding significant manageability, availability, and performance capabilities to large underlying database tables and indexes. Oracle Partitioning permits large tables to be broken into individually managed smaller pieces, while retaining a single application- level view of the data.

    pdf11p yasuyidol 02-04-2013 18 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P2:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 52 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P10:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 48 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P12:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 43 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P13:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 36 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P14:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 55 3   Download

  • As part of its new Digital Government program, the National Science Foundation (NSF) requested that the Computer Science and Telecommunications Board (CSTB) undertake an in-depth study of how information technology research and development could more effectively support advances in the use of information technology (IT) in government.

    pdf69p camnhung_1 14-12-2012 35 3   Download

  • Researches on deductive database systems are not new ones, but propose of data model allowing manipulating data and knowledge on a particular framework is not easy but interesting goal. The paper aims at a model for knowledge in educational and training environment, beside of a presenting the achievement in the existing systems concerning knowledge. Certain data manipulation techniques for knowledge acquisition are proposed in the model, as knowledge discovering techniques in deductive database systems. ...

    pdf6p tuanlocmuido 19-12-2012 31 3   Download

  • Tham khảo sách 'weight loss: a medical dictionary, bibliography, and annotated research guide to internet references', văn hoá - nghệ thuật, thời trang - làm đẹp phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf461p cronus75 13-01-2013 100 3   Download

  • Michael V Mannino has been involved in the database field since 1980. He has taught data­ base management since 1983 at several major universities (University of Florida, Univer­ sity of Texas at Austin, University of Washington, and University of Colorado at Denver). His audiences have included undergraduate MIS students, graduate MIS students, MBA students, and doctoral students as well as corporate employees in retraining programs.

    pdf736p animorphs 18-03-2013 26 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản