Readings in Database Systems
by J. M. Hellerstein, M. Stonebraker
Publisher: UC Berkeley 1999
ISBN/ASIN: 0262693143
Description:
Lessons from database research have been applied in academic fields ranging from bioinformatics to next-generation Internet architecture and in industrial uses including Web-based e-commerce and search engines. This text provides both students and professionals with a grounding in database research and a technical context for understanding recent innovations in the field.
Download or read it online for free here:
Read online
(online html)
Similar books
Data Mining Desktop Survival Guide
by Graham Williams - Togaware Pty Ltd
Data mining is about building models from data. We build models to gain insights into the world and how the world works. A data miner, in building models, deploys many different data analysis and model building techniques.
(26850 views)
by Graham Williams - Togaware Pty Ltd
Data mining is about building models from data. We build models to gain insights into the world and how the world works. A data miner, in building models, deploys many different data analysis and model building techniques.
(26850 views)
Concurrency Control and Recovery in Database Systems
by P. A. Bernstein, V. Hadzilacos, N. Goodman - Addison Wesley
This book is about techniques for concurrency control and recovery. It covers techniques for centralized and distributed computer systems, and for single copy, multiversion, and replicated databases. Example applications are included.
(22891 views)
by P. A. Bernstein, V. Hadzilacos, N. Goodman - Addison Wesley
This book is about techniques for concurrency control and recovery. It covers techniques for centralized and distributed computer systems, and for single copy, multiversion, and replicated databases. Example applications are included.
(22891 views)
Forensic Analysis of Database Tampering
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21144 views)
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21144 views)
Internet Advertising
by S. Yuan, A.Z. Abidin, M. Sloan, J. Wang - arXiv
A comprehensive survey on Internet advertising, discussing the research issues, identifying the recent technologies, and suggesting its future directions. We start with a brief history, introduction, and classification of the industry.
(15008 views)
by S. Yuan, A.Z. Abidin, M. Sloan, J. Wang - arXiv
A comprehensive survey on Internet advertising, discussing the research issues, identifying the recent technologies, and suggesting its future directions. We start with a brief history, introduction, and classification of the industry.
(15008 views)