Results 31 to 40 of about 2,504,885 (377)

An interactive style of the testing database production for EIS

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2006
Using a progressive Information Technology for development of Software Modules for Enterprise Information Systems brings a lot of practical and theoretical problems.
Milan Mišovič, Ivana Rábová
doaj   +1 more source

A dubiety-determining based model for database cumulated anomaly intrusion [PDF]

open access: yes, 2007
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions ...
Lu, G, Lü, K, Yi, J
core   +1 more source

CockroachDB: The Resilient Geo-Distributed SQL Database

open access: yesSIGMOD Conference, 2020
We live in an increasingly interconnected world, with many organizations operating across countries or even continents. To serve their global user base, organizations are replacing their legacy DBMSs with cloud-based systems capable of scaling OLTP ...
Rebecca Taft   +16 more
semanticscholar   +1 more source

ETP-Mine: An Efficient Method for Mining Transitional Patterns [PDF]

open access: yes, 2010
A Transaction database contains a set of transactions along with items and their associated timestamps. Transitional patterns are the patterns which specify the dynamic behavior of frequent patterns in a transaction database.
Bhaskar, A., Kumar, B. Kiran
core   +2 more sources

Machine learning approach to detect intruders in database based on hexplet data structure

open access: yesJournal of Electrical Systems and Information Technology, 2016
Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders.
Saad M. Darwish
doaj   +1 more source

SALES LEVEL ANALYSIS USING THE ASSOCIATION METHOD WITH THE APRIORI ALGORITHM

open access: yesJurnal Riset Informatika, 2022
The company does not yet know the pattern of consumer purchases because so far, the sales transaction data has not been used correctly and does not have a unique method to determine consumer buying patterns.
Samuel Samuel   +4 more
doaj   +1 more source

Implementation of the Association Method in the Analysis of Sales Data from Manufacturing Companies

open access: yesJurnal Riset Informatika, 2022
The company produces sales data every day. Over time, the data increases, and the amount becomes very large. The data is only stored without understanding the benefits that exist from these data due to limitations in proper knowledge in analyzing the ...
Andri Agung Riyadi   +3 more
doaj   +1 more source

Functionally Specified Distributed Transactions in Co-operative Scenarios [PDF]

open access: yes, 1995
Addresses the problem of specifying co-operative, distributed transactions in a manner that can be subject to verification and testing. Our approach combines the process-algebraic language LOTOS and the object-oriented database modelling language TM to ...
By, Rolf A. de   +2 more
core   +2 more sources

Model Data Warehouse dan Business Intelligence untuk Meningkatkan Penjualan pada PT. S

open access: yesComTech, 2011
Today a lot of companies use information system in every business activity. Every transaction is stored electronically in the database transaction. The transactional database does not help much to assist the executives in making strategic decisions to ...
Rudy Rudy, Natalia Limantara
doaj   +1 more source

Enhancing Saga Pattern for Distributed Transactions within a Microservices Architecture

open access: yesApplied Sciences, 2022
The saga pattern manages transactions and maintains data consistency across distributed microservices via utilizing local sequential transactions that update each service and publish messages to trigger the next ones.
Eman Daraghmi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy