71 |
KeyX: selective key-oriented indexing in native XML-databases /Hammerschmidt, Beda Christoph. January 2006 (has links)
Univ., Diss.--Lübeck, 2005. / Literaturverz. S. [165] - 175.
|
72 |
BioMeRSA : the biology media repository with semantic augmentation /Cornwell, Adam. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 94-100).
|
73 |
A requirement analysis of the Naval Postgraduate School's alumni database system /Gaines, Lawrence M. January 2002 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Julie Filizetti, Daniel Dolk. Includes bibliographical references (p. 83-84). Also available online.
|
74 |
Query processing in multiresolution spatial databases /Prasher, Sham. January 2005 (has links) (PDF)
Thesis (Ph.D.) - University of Queensland, 2005. / Includes bibliography.
|
75 |
Design, implementation and performance tests for query sampling in DB2 /Guo, Junjie. January 2004 (has links)
Thesis (M.Sc.)--York University, 2004. Graduate Programme in Computer Science. / Typescript. Includes bibliographical references (leaves 112-116). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: LINK NOT YET AVAILABLE.
|
76 |
KeyX: selective key-oriented indexing in native XML-databases /Hammerschmidt, Beda Christoph. January 1900 (has links)
Thesis (doctoral)--Universität zu Lübeck, 2006. / Includes index and bibliographical references (p. [165]-175).
|
77 |
Index selection using hypothetical configuration evaluation /Narasayya, Vivek R. January 2000 (has links)
Thesis (Ph. D.)--University of Washington, 2000. / Vita. Includes bibliographical references (leaves 95-97).
|
78 |
File integrity checkingMotara, Yusuf Moosa January 2006 (has links)
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized code. File integrity checking is examined as a means of removing this attack vector, and the design, implementation, and evaluation of a best-of-breed file integrity checker for the Linux operating system is undertaken. We conclude that the resultant file integrity checker does succeed in removing file execution as an attack vector, does so at a computational cost that is negligible, and displays innovative and useful features that are not currently found in any other Linux file integrity checker.
|
79 |
BYU Vocal Performance DatabaseChapman, Jana Lynn 16 July 2010 (has links) (PDF)
The vocal performance database is a tool by which BYU vocal performance faculty and students may practice, assess, and review vocal performances, including practice juries, recitals, and end-of-semester juries. This document describes the process and results of designing, developing, implementing, and evaluating the vocal performance database. By using this tool, vocal performance professors are able to give faster, more quality feedback to students following the jury. Students are able to receive legible feedback from their professors in a timely manner.
|
80 |
Web-based independent study programScroggins, Darryl Dwaine 01 January 2005 (has links)
The Web-based Independent Study Program (WISP) is an on-line database program used to create and store educational records for members of Dikaios. (Dikaios is a Christian educators association that offers an independent study program.) The database allows home educators to create, store, edit, view, and print the forms and records that are required by Dakaios administrators and by the state of California. Further, the database helps students and home educators monitor student progress towards meeting high school graduation requirements.
|
Page generated in 0.074 seconds