ACM DL

Database Systems (TODS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Database Systems (TODS), Volume 12 Issue 4, Dec. 1987

IFO: a formal semantic database model
Serge Abiteboul, Richard Hull
Pages: 525-565
DOI: 10.1145/32204.32205
A new, formally defined database model is introduced that combines fundamental principles of “semantic” database modeling in a coherent fashion. Using a graph-based formalism, the IFO model provides mechanisms for representing...

Extending relational algebra and relational calculus with set-valued attributes and aggregate functions
G. Özsoyoğlu, Z. M. Özsoyoğlu, V. Matos
Pages: 566-592
DOI: 10.1145/32204.32219
In commercial network database management systems, set-valued fields and aggregate functions are commonly supported. However, the relational database model, as defined by Codd, does not include set-valued attributes or aggregate functions....

The use of regression methodology for the compromise of confidential information in statistical databases
Michael A. Palley, Jeffrey S. Simonoff
Pages: 593-608
DOI: 10.1145/32204.42174
A regression methodology based technique can be used to compromise confidentiality in a statistical database. This holds true even when the DBMS prevents application of regression methodology to the database. Existing inference controls,...

Concurrency control performance modeling: alternatives and implications
Rakesh Agrawal, Michael J. Carey, Miron Livny
Pages: 609-654
DOI: 10.1145/32204.32220
A number of recent studies have examined the performance of concurrency control algorithms for database management systems. The results reported to date, rather than being definitive, have tended to be contradictory. In this paper, rather than...

Multikey access methods based on superimposed coding techniques
R. Sacks-Davis, A. Kent, K. Ramamohanarao
Pages: 655-696
DOI: 10.1145/32204.32222
Both single-level and two-level indexed descriptor schemes for multikey retrieval are presented and compared. The descriptors are formed using superimposed coding techniques and stored using a bit-inversion technique. A fast-batch insertion...