Results 191 to 200 of about 83,370 (327)
SQL UŽKLAUSŲ OPTIMIZAVIMO TYRIMAS = SQL QUERY OPTIMIZATION RESEARCH
Although scientific literature studies different aspects of SQL query optimization the major part of researches is limited to the theoretical analysis of problems.
Jurgita Lieponienė
doaj
Software development guidelines for Visual Basic and SQL Server
T.G. Ibsen
openalex +2 more sources
The Complete Chloroplast Genome of Tornillo (Cedrelinga cateniformis Ducke 1922, Fabaceae)
Tornillo (Cedrelinga cateniformis) is a tropical tree from the Fabaceae family, valued as a substitute for overexploited timber species. This study presents the first complete chloroplast genome sequencing of Tornillo, revealing a 176,700 bp structure with 138 genes and confirming its phylogenetic placement within the Ingeae tribe.
Nora Scarcelli+9 more
wiley +1 more source
ABSTRACT Horizon scanning (HS) is a method for the identification of emerging change through systematic analysis of trusted sources using a defined scope and prespecified methods. In health research, it can provide early awareness of potential developments ahead of market access. Within the medicines space, HS is supported by international requirements
Sarah Khan+5 more
wiley +1 more source
How Software Design Affects Energy Performance: A Systematic Literature Review
This SLR provides insight into the state of the art of the field investigating how software transformation impacts energy performance. While a wide array of design patterns, refactorings, and code smells have been examined from this perspective, there remains much to explore in future work.
Déaglán Connolly Bree+1 more
wiley +1 more source
Temporal XML? SQL Strikes Back! [PDF]
Fusheng Wang, Carlo Zaniolo, Xin Zhou
openalex +1 more source
ExSPIN: Explicit Feedback-Based Self-Play Fine-Tuning for Text-to-SQL Parsing. [PDF]
Yan L+7 more
europepmc +1 more source
Security Risks in the Encryption of Database Connection Strings
ABSTRACT Background There exists an important and open problem with the encrypting of database connection strings in that related connection strings start with well known identical initial sub‐strings. When these initial sub‐strings are longer than the encrypting algorithm's block size, the resulting encrypted text for related database connection ...
Ross Rannells, James H. Hill
wiley +1 more source
Quantitative Evaluations on the Query Modeling and System Integrating Cost of SQL/MDR [PDF]
Dongwon Jeong+2 more
openalex +1 more source