Database systems for mangement
暂无分享,去创建一个
James F. Courtney | David Paradice | Kristen L. Brewer | Julia C. Graham | D. Paradice | J. Courtney | J. C. Graham
[1] Charles Cresson Wood,et al. Security modules: Potent information security system components , 1986, Comput. Secur..
[2] Jan E. Bond. Horizontal partitioning , 1988, CSC '88.
[3] G. Kaplen. Engineering workstations-the user's view , 1992, IEEE Spectrum.
[4] Michael G Maihofer,et al. Reinvent the wheel. , 2005, The Journal of the Michigan Dental Association.
[5] Chao-Chih Yang. Relational databases , 1985 .
[6] Bruce G. Lindsay,et al. Transaction management in the R* distributed database management system , 1986, TODS.
[7] R. Mahmutčehajić. On the Other , 2011 .
[8] Toby J. Teorey,et al. Design of Database Structures , 1982 .
[9] Dennis Tsichritzis,et al. The ANSI/X3/SPARC DBMS Framework Report of the Study Group on Dabatase Management Systems , 1978, Inf. Syst..
[10] R. Ageloff. A primer on SQL , 1988 .
[11] C. J. Date. Where SQL falls short , 1987 .
[12] M. Y. Chan,et al. Database concurrency control using read/write set information , 1986, Inf. Syst..
[13] Stéphane Bressan,et al. Introduction to Database Systems , 2005 .
[14] Norman E. Gibbs,et al. Principles of data structures and algorithms with Pascal , 1987 .
[15] Donald D. Chamberlin,et al. SEQUEL 2: A Unified Approach to Data Definition, Manipulation, and Control , 1976, IBM J. Res. Dev..
[16] Mihalis Yannakakis,et al. Deadlock-freedom (and saftey) of transactions in a distributed database , 1985, PODS '85.
[17] Connolly,et al. Database Systems , 2004 .
[18] P. A. D. DeMaine,et al. Integrated Systems , 1991 .
[19] Panagiotis Louridas,et al. Version Control , 2019, Modern Programming Made Easy.
[20] Richard Botting. Novel security techniques for online systems , 1986, CACM.
[21] Donald D. Chamberlin,et al. SEQUEL: A structured English query language , 1974, SIGFIDET '74.
[22] William Kent,et al. ASlMPLE GUIDE TO FIVE NORMAL FORMS IN RELATIONAL DATABASE THEORY , 2000 .
[23] Niv Ahituv,et al. Approaches to handling "Trojan Horse" threats , 1986, Comput. Secur..
[24] Radu Popescu-Zeletin,et al. Transaction management in distributed heterogeneous database management systems , 1986, Inf. Syst..
[25] Ronald Fagin,et al. A normal form for relational databases that is based on domains and keys , 1981, TODS.
[26] E. F. Codd,et al. Extending the database relational model to capture more meaning , 1979, ACM Trans. Database Syst..
[27] Lance J. Hoffman,et al. A survey of issues in computer network security , 1986, Comput. Secur..
[28] E. F. Codd,et al. A relational model of data for large shared data banks , 1970, CACM.
[29] Moshé M. Zloof. Query by example , 1975, AFIPS '75.
[30] Richard Matthews,et al. Islands of automation , 1997 .
[31] E. F. Codd,et al. A data base sublanguage founded on the relational calculus , 1971, SIGFIDET '71.
[32] Meichun Hsu,et al. Partitioned two-phase locking , 1986, TODS.