Filters








2,440 Hits in 6.9 sec

Active database rules with transaction-conscious stable-model semantics [chapter]

Carlo Zaniolo
1995 Lecture Notes in Computer Science  
In this paper, we introduce a durable change semantics for active database rules; this semantics improves Starburst's deferred activation notion with concepts taken from Postgres and Heraclitus and the  ...  But in addition to these differences, active rules are also unique inasmuch as their meaning is intertwined with the concept of database transactions.  ...  Active Rules as Deductive Rules We will now define a logic-based semantics for active rules with priority assignment.  ... 
doi:10.1007/3-540-60608-4_34 fatcat:paaloss4ubd4fhgegjhd6ip43m

Nested transactions in a logical language for active rules [chapter]

Bertram Ludäscher, Wolfgang May, Georg Lausen
1996 Lecture Notes in Computer Science  
We p r e s e n t a hierarchically structured transaction-oriented concept for a rule-based active database system.  ...  While (ii) serves as a conceptual model of active rule behavior and allows to reason about properties of the speci ed transactions, (i) { together with the appropriate execution model { yields an operational  ...  The active database manifesto, for example, requires as an essential feature that \: : : rule execution must have a clear semantics, ie must de ne when, how, and on what database state conditions are evaluated  ... 
doi:10.1007/bfb0031742 fatcat:bpcipvnngrg43bozttr6lxtg5m

Logic and Databases: Past, Present, and Future

Jack Minker
1997 The AI Magazine  
I review developments in the field, assess contributions, consider the status of implementations of deductive databases, and discuss future work needed in deductive databases. Articles  ...  Gallaire, Minker, and Nicolas stated that logic and databases was a field in its own right. This was the first time that this designation was made.  ...  The full paper is dedicated in honor of Hervé Gallaire and Jean-Marie Nicolas with whom I have worked as co-author, co-editor, colleague, and friend and who have helped to make the field of deductive databases  ... 
doi:10.1609/aimag.v18i3.1304 dblp:journals/aim/Minker97 fatcat:6foa4j2a45cabojbsyxj7rwpfq

CREAM: An Infrastructure for Distributed, Heterogeneous Event-Based Applications [chapter]

M. Cilia, C. Bornhövd, A. P. Buchmann
2003 Lecture Notes in Computer Science  
Here we address four key issues in distributed and heterogeneous environments: event detection and notification, event composition, an active functionality service, and ontology support.  ...  We show the need for ontology support at all levels in heterogeneous environments and present a distributed active functionality service that addresses the difficult issues of event composition in widely  ...  The unbundling of active databases consists of separating the active part from active DBMSs and breaking it up into components providing services like event detection, rule definition, rule management,  ... 
doi:10.1007/978-3-540-39964-3_30 fatcat:2gjezopbkjfsvltkq5cvne6poe

An Ontology-Based Framework for Modeling User Behavior—A Case Study in Knowledge Management

Liana Razmerita
2011 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
The results of this research may contribute to the development of other frameworks for modeling user behavior, other semantic-enhanced user modeling frameworks or other semantic-enhanced information systems  ...  This article focuses on the role of user modeling and semantic-enhanced representations for personalization.  ...  The semantics associated with the domain and user model is mapped into the user and domain ontology.  ... 
doi:10.1109/tsmca.2011.2132712 fatcat:stzl62laozebpaqxzb7tdngfuu

Event-based applications and enabling technologies

Annika Hinze, Kai Sachs, Alejandro Buchmann
2009 Proceedings of the Third ACM International Conference on Distributed Event-Based Systems - DEBS '09  
Academic attempts include, e.g., [4] in the area of benchmarking and [33] in the area of performance modeling.  ...  Industry is asking for reliable and unbiased performance modeling and evaluation. This will require the involvement of organizations, such as TPC and SPEC.  ...  Event rule specification has been studied in active database systems for several years with special focus on composite events and temporal conditions.  ... 
doi:10.1145/1619258.1619260 dblp:conf/debs/HinzeSB09 fatcat:ca66ahf6b5dxpkeackhxlf7q2y

Crawler [chapter]

Kenneth A. Ross, Christian S. Jensen, Richard Snodgrass, Curtis E. Dyreson, Christian S. Jensen, Richard Snodgrass, Spiros Skiadopoulos, Cristina Sirangelo, Mary Lynette Larsgaard, Gösta Grahne, Daniel Kifer, Hans-Arno Jacobsen (+106 others)
2009 Encyclopedia of Database Systems  
Cache-conscious algorithms typically employ knowledge of architectural parameters such as cache size and latency.  ...  Many database workloads have shifted from being I/O bound to being memory/CPUbound as the amount of memory per machine has been increasing.  ...  This is the same as the active-generic collapse but with natural domain semantics instead of active domain semantics.  ... 
doi:10.1007/978-0-387-39940-9_2315 fatcat:x4qspjdytvhvroc7h753dihp7u

A Model of CAD Transactions

François Bancilhon, Won Kim, Henry F. Korth
1985 Very Large Data Bases Conference  
The public system manages the public database of stable design data and design control data. A private system manages the private database of a designer on a design workstation.  ...  A CAD environment requires a significantly different model of transaction from that developed for typical data-processing applications.  ...  Definitions A global database in our model consists of the public database and the private databases of active transactions.  ... 
dblp:conf/vldb/BancilhonKK85 fatcat:v453jllcarfyzcj3f7ga3alkqe

Report from the NSF workshop on workflow and process automation in information systems

Amit Sheth, Dimitrios Georgakopoulos, Stef M. M. Joosten, Marek Rusinkiewicz, Walt Scacchi, Jack Wileden, Alexander L. Wolf
1997 Software engineering notes  
The workshop brought together active researchers and practitioners from several communities, with significant representation from database and distributed systems, software process and softwaxe engineering  ...  been developed to deal with the limitations of database transactions.  ...  This is due to the large number of rules and overhead associated with rule invocation and management.  ... 
doi:10.1145/251759.251825 fatcat:arfg2wgdwnf7bghanmvz2zlyoq

Prognosis of Disease that may Occur with Growing Age using Confabulation Based Algorithm

Neha Srivastava, Jyoti Gautam
2017 Defence Life Science Journal  
It is concerned with acquisition of problem-solving skills, intelligence and conscious thought and uses prevailing knowledge to generate new rules.  ...  Here, a new algorithm CMARM is proposed for analysis of symptoms in order to find out the disease that may occur frequently and rarely with growing age.  ...  Hence, it requires only one scanning of the database and show a stable execution time and memory usage with increase in number of transactions as shown in Fig 1 and Fig 4 respectively .  ... 
doi:10.14429/dlsj.2.11029 fatcat:o5vnsgb7efbsfnzzvlqak2qrvy

Approaches to Web Service Composition for the Semantic Web

Mohammed H. Ramadhan
2021 Qubahan Academic Journal  
We classified these approaches according to the processing of the service descriptions, which can be syntactic or semantic-based service processes.  ...  The semantic web is an advanced form of the current web in which all contents have well-defined meanings due to nature, allowing machines to process web contents automatically.  ...  The context-conscious strategy is optimal for the domain-specific problem and delivers better results, whereas a linear classification for web service composition uses QoS parameters and produces transactional  ... 
doi:10.48161/qaj.v1n3a78 fatcat:5uwcbalv5zboxgfgensjzjzdqa

Establishing Multi-level Security in Mobile Data Access

Muhammad Mukaram Khan, Constantinos Papadopoulos
2007 The Open Information Systems Journal  
Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and available power, as well as due to intermittent connectivity that causes loss of data and transaction  ...  In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access  ...  The semantics of transaction processing (and the preservation of the above properties too) had been considered in an earlier work [11] , in which Walborn and Chrysanthis had extended semantic-based models  ... 
doi:10.2174/1874133900701010019 fatcat:hbvuvy2bmzfojg5ionsc6xmfze

Establishing Multi-level Security in Mobile Data Access

Muhammad Mukaram Khan, Constantinos Papadopoulos
2007 The Open Information Systems Journal  
Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and available power, as well as due to intermittent connectivity that causes loss of data and transaction  ...  In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access  ...  The semantics of transaction processing (and the preservation of the above properties too) had been considered in an earlier work [11] , in which Walborn and Chrysanthis had extended semantic-based models  ... 
doi:10.2174/187413390701011909 fatcat:pafaz6yskfcxpmf7x47atbfwfm

An Adaptive Policy for Improved Timeliness in Secure Database Systems [chapter]

Sang H. Son, Rasikan David, Bhavani Thuraisingham
1996 IFIP Advances in Information and Communication Technology  
Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency.  ...  Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  This effectively moves the transaction into the past with respect to active transactions.  ... 
doi:10.1007/978-0-387-34932-9_13 fatcat:ocyf4zj3tjbwzdwdah2xvd4ql4

Software Architecture Design [chapter]

2016 Mobile Terminal Receiver Design  
I would also like to thank Francesco Marcelloni, who visited us for a year, and with whom I had many discussions on the realm of science and life.  ...  As such concepts are stable and well-defined abstractions with rich semantics.  ...  After the people got conscious about the problem solving concepts and explicitly reasoned about these, the next level of consciousness started to develop with the control concepts.  ... 
doi:10.1002/9781119107422.ch7 fatcat:uae6juznkvhrvkqsxssmhcjh4a
« Previous Showing results 1 — 15 out of 2,440 results