Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,328,467 papers from all fields of science
Search
Sign In
Create Free Account
Database
Known as:
Computer database
, Research database
, Relation-valued attribute
Expand
A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views, and other objects.The data are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
A/B testing
ADO.NET data provider
Application security
Attribute–value pair
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Towards Graph Containment Search and Indexing
Cheng Chen
,
Xifeng Yan
,
Philip S. Yu
,
Jiawei Han
,
Dong-Qing Zhang
,
Xiaohui Gu
Very Large Data Bases Conference
2007
Corpus ID: 1803605
Given a set of model graphs D and a query graph q, containment search aims to find all model graphs g e D such that q contains g…
Expand
Highly Cited
2005
Highly Cited
2005
Processing Window Queries in Wireless Sensor Networks
Yingqi Xu
,
Wang-Chien Lee
,
Jianliang Xu
,
Gail Mitchell
2005
Corpus ID: 6989601
The existing query processing techniques for sensor networks rely on a network infrastructure for query propagation and data…
Expand
Highly Cited
2003
Highly Cited
2003
Proceedings of the 4th International Conference on Mobile Data Management
Panos K. Chrysanthis
,
G. Samaras
2003
Corpus ID: 60364310
Highly Cited
2002
Highly Cited
2002
Distributed Search in P2P Networks
S. Waterhouse
,
David Doolin
,
Gene Kan
,
Yaroslav Faybishenko
IEEE Internet Computing
2002
Corpus ID: 40253633
Most Web content is invisible to current search engines. JXTA Search addresses this problem, providing a unique query routing…
Expand
Highly Cited
1999
Highly Cited
1999
Crossflow Stability and Transition Experiments in Swept-Wing Flow
J. Dagenhart
,
W. Saric
,
+4 authors
H. Morgan
1999
Corpus ID: 123210793
An experimental examination of crossflow instability and transition on a 45 degree swept wing was conducted in the Arizona State…
Expand
Highly Cited
1998
Highly Cited
1998
Neural networks applied in intrusion detection systems
J. M. Bonifacio
,
A. Cansian
,
A. Carvalho
,
Edson dos Santos Moreira
IEEE International Joint Conference on Neural…
1998
Corpus ID: 57203440
Information is one of the most valuable possessions today. As the Internet expands both in number of hosts connected and number…
Expand
Highly Cited
1995
Highly Cited
1995
Computer Applications and Quantitative Methods in Archaeology 1993
John Wilcock Kris Lockyear
,
A. Bayliss
1995
Corpus ID: 53937437
Review
1993
Review
1993
Methods for characterizing stream habitat as part of the National Water-Quality Assessment Program
M. Meador
,
C. Hupp
,
T. Cuffney
,
M. Gurtz
1993
Corpus ID: 128853641
Stream habitat is characterized in the U.S. Geological Survey's National Water-Quality Assessment Program as part of an…
Expand
Review
1989
Review
1989
Knowledge Programming in Loops: Report on an Experimental Course
M. Stefik
,
D. Bobrow
,
S. Mittal
,
L. Conway
The AI Magazine
1989
Corpus ID: 2712977
Early this year fifty people took an experimental course at Xerox PARC on knowledge programming in Loops During the course, they…
Expand
Highly Cited
1975
Highly Cited
1975
Analysis of natural scenes.
R. Ohlander
1975
Corpus ID: 60833117
Abstract : This report describes work performed on two aspects of the scene analysis process. These are segmentation, and the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE