Showing
1 - 9
results of
9
for search '
PRINCIPLES OF DATABASE SYSTEM
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Reset Filters
Author:
Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Reset Filters
Show filters (1)
Author:
Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Search Results - PRINCIPLES OF DATABASE SYSTEM
Showing
1 - 9
results of
9
for search '
PRINCIPLES OF DATABASE SYSTEM
'
, query time: 0.53s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Speedy transactions in multicore in-memory
databases
by
Tu, Stephen
,
Zheng, Wenting
,
Kohler, Eddie
,
Liskov, Barbara H.
,
Madden, Samuel R.
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
2
Intrusion recovery for
database
-backed web applications
by
Chandra, Ramesh
,
Kim, Taesoo
,
Shah, Meelap
,
Narula, Neha
,
Zeldovich, Nickolai
Published 2012
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
3
Towards optimization-safe
systems
: analyzing the impact of undefined behavior
by
Wang, Xi
,
Zeldovich, Nickolai
,
Kaashoek, M. Frans
,
Solar-Lezama, Armando
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
4
From Network Interface to Multithreaded Web Applications: A Case Study in Modular Program Verification
by
Chlipala, Adam
Published 2015
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
5
From Network Interface to Multithreaded Web Applications: A Case Study in Modular Program Verification
by
Chlipala, Adam
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
6
CryptDB: Protecting confidentiality with encrypted query processing
by
Popa, Raluca Ada
,
Redfield, Catherine M.
,
Zeldovich, Nickolai
,
Balakrishnan, Hari
Published 2012
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
7
Approximating and testing k-histogram distributions in sub-linear time
by
Indyk, Piotr
,
Levi, Reut
,
Rubinfeld, Ronitt
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
8
Towards Tight Bounds for the Streaming Set Cover Problem
by
Har-Peled, Sariel
,
Indyk, Piotr
,
Mahabadi, Sepideh
,
Vakilian, Ali
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
9
Enabling Privacy-Preserving GWASs in Heterogeneous Human Populations
by
Sahinalp, Cenk
,
Simmons, Sean Kenneth
,
Berger Leighton, Bonnie
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
Search Tools:
Get RSS Feed
—
Email this Search
Back
Narrow Search
Format
Article
9
Sources
MIT IR
9
Collections
Institutional Repositories
9
Author
Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
7
Zeldovich, Nickolai
3
Chlipala, Adam
2
Indyk, Piotr
2
Balakrishnan, Hari
1
Berger Leighton, Bonnie
1
Chandra, Ramesh
1
Har-Peled, Sariel
1
Kaashoek, M. Frans
1
Kim, Taesoo
1
Kohler, Eddie
1
Levi, Reut
1
Liskov, Barbara H.
1
Madden, Samuel R.
1
Mahabadi, Sepideh
1
Massachusetts Institute of Technology. Department of Mathematics
1
Narula, Neha
1
Popa, Raluca Ada
1
Redfield, Catherine M.
1
Rubinfeld, Ronitt
1
Sahinalp, Cenk
1
Shah, Meelap
1
Simmons, Sean Kenneth
1
Solar Lezama, Armando
1
Solar-Lezama, Armando
1
Tu, Stephen
1
Vakilian, Ali
1
Wang, Xi
1
Zheng, Wenting
1
see all ...
Language
English
9
Genre
Article
9
Year of Publication
From:
To:
Loading...