29 research outputs found
A systematic approach to the design of complex systems : application to DBMS design and evaluation
Bibliography: leaves 80-85.R.C. Andreu, S.E. Madnick
Decision rules for the automated generation of storage strategies in data management systems
Thesis. 1975. M.S.--Massachusetts Institute of Technology. Alfred P. Sloan School of Management.Bibliography: leaves 152-155.by Grant N Smith.M.S
A Domain-Specific Conceptual Query System
This thesis presents the architecture and implementation of a query system resulted from a domain-specific conceptual data modeling and querying methodology. The query system is built for a high level conceptual query language that supports dynamically user-defined domain-specific functions and application-specific functions. It is DBMS-independent and can be translated to SQL and OQL through a normal form. Currently, it has been implemented in neuroscience domain and can be applied to any other domain
Data dependent program generation
PhD ThesisWhen information is stored in a computer it can usually be
organised in many different ways. If the information is
used for a number of different purposes the ideal
organisation is not always obvious. It will depend on how
often various parts of the data are used, how often they are
changed, and the amount of data taking part in each
transaction. It may be difficult to predict these
parameters in advance, especially in data-base applications
where the pattern of use may change as time goes by.
Ultimately, one can visualise systems which can
automatically choose the optimum
can substantially assist in the
representation, or
choice. A step in
which
this
direction, which could itself find immediate application, is
to find a practical way to tailor programs to a particular
data organisation. The thesis describes an experimental
system which does this for a limited range of programs, and
the work which lead up to it. Both data retrieval and
simple updates are considered.
One prerequisite is a method of writing the program so that
it does not depend on the way that the data is stored. A
number of data-base systems achieve this independence by
describing the data as a collection of relations. These
systems and the background to them are reviewed. The
experimental system is loosely based on the use of
relations, but some modifications have been made to make the
processing simpler and so that the characteristics of the
data organisation can be described. The system incorporates
the representation into the program and produces a tailored
version which is expressed in abstract, Algol-like code.
The result is intended to be similar to code which a human
programmer might write in similar circumstances, but as far
as possible ignoring the details of any particular
implementation.IBM, Advanced Education Scheme
Design and implementation of a relational data base system for a minicomputer
Journal ArticleA data base system provides the advantages of centralized control of data including increased data independence. Design specifications for a low level relational data base interface are given in the form of a formal description which separates the implementation details from the description of the functions making up the interface. The formal description may be used by both the user and implementer of the system. The minicomputer implementation of the data base system described is intended to be used directly by application programmers or as a base on which to build a higher level interface. The functions making up the system are FORTRAN callable subroutines making it convenient for minicomputer application programs to use the system. A method of utilizing the low level interface to implement a higher level interface based on the relational algebra is outlined
A Smart XML Access Right Controller for Mobile Applications
International audienceChip-Secured XML Access (C-SXA) is a versatile XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of on-board personal data or to control the flow of data extracted from an external source. C-SXA addresses a broad range of applications, like secure portable folders, Digital Right Management, parental control or exchange of confidential information among a community of users. We illustrate the effectiveness of this technology through a collaborative agenda application embedded in a cellular phone SIM card