Object-Oriented Databases: An Introduction by Chorafas by Chorafas Dimitris N. Steinmann Heinrich

By Chorafas Dimitris N. Steinmann Heinrich

Exploring the numerous recommendations that underpin object-oriented (OO) ways, this e-book provides functional assurance of the illustration, keep an eye on and consistency of OO database platforms.

Show description

Read Online or Download Object-Oriented Databases: An Introduction by Chorafas Dimitris N. Steinmann Heinrich (1993-02-01) Hardcover PDF

Best organization and data processing books

Visual and Spatial Analysis - Advances in Data Mining, Reasoning, and Problem Solving Boris Kovalerchuk (Springer 2004 596s)

Complicated visible research and challenge fixing has been carried out effectively for millennia. The Pythagorean Theorem was once confirmed utilizing visible skill greater than 2000 years in the past. within the nineteenth century, John Snow stopped a cholera epidemic in London via featuring particular water pump be close down. He came across that pump by means of visually correlating info on a urban map.

Entertainment Computing – ICEC 2004: Third International Conference, Eindhoven, The Netherlands, September 1-3, 2004. Proceedings

The development of data and verbal exchange applied sciences (ICT) has enabled extensive use of ICT and facilitated using ICT within the inner most and private area. ICT-related industries are directing their enterprise goals to domestic functions. between those purposes, leisure will differentiate ICT purposes within the deepest and private marketplace from the of?

Theory of Relational Databases

The idea of Relational Databases. David Maier. Copyright 1983, laptop technological know-how Press, Rockville. Hardcover in excellent . markings. NO airborne dirt and dust jacket. Shelved in expertise. The Bookman serving Colorado Springs because 1990.

Additional info for Object-Oriented Databases: An Introduction by Chorafas Dimitris N. Steinmann Heinrich (1993-02-01) Hardcover

Sample text

Journal of Database Management, 18(1), 69-93. Pons, A. , & Aljifri, H. (2003). Data protection using watermarking in e-business. Journal of Database Management, 14(4), 1-13. , & Dhillon, G. (2003). Integrating digital signatures with relational databases: Issues and organizational implications. Journal of Database Management, 14(2), 42-51. , & Wang, Y. (2001). Collusion secure q-ary fingerprinting for perceptual content. Digital Rights Management Workshop (pp. 57-75). Sion, R. (2004). Proving ownership over categorical data.

Figure 5 indicates that the less attributes are involved in the construction of the virtual primary key, the less the impact of attribute deletion. However, as it shall be shown in the next subsection, using less attributes in the construction of the virtual primary key will degrade the uniqueness property of the virtual primary key, which increases the false-miss rates against tuple-related attacks. Therefore, there is a trade-off between tuplerelated attacks and attribute deletion in terms of the number of attributes in the virtual-primary-key construction.

Element-based scheme The multiple-bits scheme discussed in the above section can be called tuple based as it processes data tuple by tuple in watermark insertion and detection. An alternative approach is to process each numerical value independently. A virtual primary key vpk is constructed from each attribute value or data element. We call such scheme element based. Ai) is used as its virtual primary key. The least-significant bit portion lsb consists of ξ bits in which a watermark bit may be embedded.

Download PDF sample

Rated 4.58 of 5 – based on 28 votes