Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic H. - Information Systems
Topic H.2 - DATABASE MANAGEMENT

H.I. Abdalla, A.A. Amer, H. Mathkour:
A Novel Vertical Fragmentation, Replication and Allocation Model in DDBSs
/jucs_20_10/a_novel_vertical_fragmentation
page 1469 - 1487
Vol.20 / Issue 10
T. Baars, M. Spruit:
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study
/jucs_18_12/analysing_the_security_risks
page 1662 - 1678
Vol.18 / Issue 12
D. Beneventano, S. Bergamaschi, F. Guerra, M. Vincini:
The SEWASIE Network of Mediator Agents for Semantic Search
/jucs_13_12/the_sewasie_network_of
page 1936 - 1969
Vol.13 / Issue 12
C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
/jucs_20_2/showing_the_benefits_of
page 79 - 106
Vol.20 / Issue 2
A. Calì, D. Calvanese, D. Martinenghi:
Dynamic Query Optimization under Access Limitations and Dependencies
/jucs_15_1/dynamic_query_optimization_under
page 33 - 62
Vol.15 / Issue 1
L. Carafoli, F. Mandreoli, R. Martoglia, W. Penzo:
A Data Management Middleware for ITS Services in Smart Cities
/jucs_22_2/a_data_management_middleware
page 228 - 246
Vol.22 / Issue 2
C.-M. Chen, T.-Y. Wu, R. Tso, M. Mambo, M.-E. Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
/jucs_21_3/on_the_security_of
page 406 - 418
Vol.21 / Issue 3
B. Chidlovskii, L. Lecerf:
Stacked Dependency Networks for Layout Document Structuring
/jucs_14_18/stacked_dependency_networks_for
page 2998 - 3010
Vol.14 / Issue 18
D. Cristofor, D. Simovici:
Finding Median Partitions Using Information-Theoretical-Based Genetic Algorithms
/jucs_8_2/finding_median_partitions_using
page 153 - 172
Vol.8 / Issue 2
F. Einsele, R. Ingold, J. Hennebert:
A Language-Independent, Open-Vocabulary System Based on HMMs for Recognition of Ultra Low Resolution Words
/jucs_14_18/a_language_independent_open
page 2982 - 2997
Vol.14 / Issue 18
J. Fan, Y. Zheng, X. Tang:
Key-Insulated Signcryption
/jucs_19_10/key_insulated_signcryption
page 1351 - 1374
Vol.19 / Issue 10
F.A. Ferrarotti, A.L. Paoletti, J.M. Turull Torres:
Redundant Relations in Relational Databases: A Model Theoretic Perspective
/jucs_16_20/redundant_relations_in_relational
page 2934 - 2955
Vol.16 / Issue 20
L. Gao, M. Wang, X.S. Wang:
Evaluating Trigger Conditions on Streaming Time Series with User-given Quality Requirements
/jucs_11_8/evaluating_trigger_conditions_on
page 1397 - 1410
Vol.11 / Issue 8
S. Ginsburg, N. C. Shu, D. A. Simovici:
Automatic Data Restructuring
/jucs_5_4/automatic_data_restructuring
page 243 - 286
Vol.5 / Issue 4
S. Hartmann, S. Link:
Weak Functional Dependencies: Full Propositional Expressiveness for the Database Practitioner
/jucs_15_1/weak_functional_dependencies_full
page 112 - 156
Vol.15 / Issue 1
D. L. Hicks, K. Tochtermann:
Personal Digital Libraries and Knowledge Management
/jucs_7_7/personal_digital_libraries_and
page 550 - 565
Vol.7 / Issue 7
M. Johnson, R. Rosebrugh, R. Wood:
Algebras and Update Strategies
/jucs_16_5/algebras_and_update_strategies
page 729 - 748
Vol.16 / Issue 5
D. Karahoca:
Meta-Cognitive Tool Development for History Teaching: Investigating how Software Usability Affects Student Achievements
/jucs_19_5/meta_cognitive_tool_evelopment
page 619 - 638
Vol.19 / Issue 5
D. Karahoca, A. Karahoca, A. Kurnaz:
Analyzing Communication Dimensions in a Ubiquitous Learning Environment
/jucs_22_1/analyzing_communication_dimensions_in
page 124 - 145
Vol.22 / Issue 1
M. Kirchberg:
Using Abstract State Machines to Model ARIES-based Transaction Processing
/jucs_15_1/using_abstract_state_machines
page 157 - 194
Vol.15 / Issue 1
S. O. Kuznetsov:
On the Intractability of Computing the Duquenne-Guigues Base
/jucs_10_8/on_the_intractability_of
page 927 - 933
Vol.10 / Issue 8
G.C. Lapasini Leal, A.P. Chaves, E.H.M. Huzita, M.E. Delamaro:
An Integrated Approach of Software Development and Test Processes to Distributed Teams
/jucs_18_19/an_integrated_approach_of
page 2686 - 2705
Vol.18 / Issue 19
J.Y. Lee, Y. Duan, J.C. Oh, W. Du, H. Blair, L. Wang, X. Jin:
Social Network Based Reputation Computation and Document Classification
/jucs_18_4/social_network_based_reputation
page 532 - 553
Vol.18 / Issue 4
A. Menezes Leitão:
UCL-GLORP - An ORM for Common Lisp
/jucs_14_20/ucl_glorp_an_orm
page 3333 - 3357
Vol.14 / Issue 20
H. Liu, L. Chen, Z. Davar, M.R. Pour:
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
/jucs_21_3/insecurity_of_an_efficient
page 473 - 482
Vol.21 / Issue 3
Z. Liu, H. Yan, Z. Lin, L. Xu:
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure
/jucs_21_3/an_improved_cloud_data
page 454 - 472
Vol.21 / Issue 3
H. Maurer, K. Tochtermann:
On a New Powerful Model for Knowledge Management and its Applications
/jucs_8_1/on_a_new_powerful
page 85 - 96
Vol.8 / Issue 1
S. Moya, S. Grau, D. Tost:
First-Person Locomotion in 3D Virtual Environments: a Usability Analysis
/jucs_20_7/first_person_locomotion_in
page 1026 - 1045
Vol.20 / Issue 7
M. Poblet:
Rule of Law on the Go: New Developments of Mobile Governance
/jucs_17_3/rule_of_law_on_the
page 498 - 512
Vol.17 / Issue 3
M. Poblet, P. Casanovas, J.-M. López-Cobo, N. Casellas:
ODR, Ontologies, and Web 2.0
/jucs_17_4/odr_ontologies_and_web20
page 618 - 634
Vol.17 / Issue 4
C. Qin, Z. Xue, Q. Feng, X. Huang:
Selecting Parameters of an Improved Doubly Regularized Support Vector Machine based on Chaotic Particle Swarm Optimization Algorithm
/jucs_23_7/selecting_parameters_of_an
page 603 - 618
Vol.23 / Issue 7
M. Rajaei, M.S. Haghjoo, E.K. Miyaneh:
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
/jucs_21_2/an_anonymization_algorithm_for
page 268 - 305
Vol.21 / Issue 2
D. Ramhorst:
A Guided Tour through the Siemens Business Services Knowledge Management Framework
/jucs_7_7/a_guided_tour_through
page 610 - 622
Vol.7 / Issue 7
K.-D. Schewe, B. Thalheim, Q. Wang:
Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States
/jucs_15_10/updates_schema_updates_and
page 2028 - 2057
Vol.15 / Issue 10
D.-W. Seo, H.-U. Chae, B.-W. Kim, W.-H. Choi, K.-H. Jo:
Human Tracking based on Multiple View Homography
/jucs_15_13/human_tracking_based_on
page 2463 - 2484
Vol.15 / Issue 13
G. Timbrell, S. Koller, N. Schefe, S. N. Lindstaedt:
A Knowledge Infrastructure Hierarchy Model for Call-Centre Processes
/jucs_11_4/a_knowledge_infrastructure_hierarchy
page 546 - 564
Vol.11 / Issue 4
K. Tochtermann, H. Maurer:
Knowledge Management and Environmental Informatics
/jucs_6_5/knowledge_management_and_environmental
page 517 - 536
Vol.6 / Issue 5
S. de Amo, M.H.F. Alves:
Incremental Maintenance of Data Warehouses Based on Past Temporal Logic Operators
/jucs_10_9/incremental_maintenance_of_data
page 1035 - 1064
Vol.10 / Issue 9

Topic H.2.m - Miscellaneous