Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,574 papers from all fields of science
Search
Sign In
Create Free Account
Object-relational mapping
Known as:
O/R mapping
, Object-Relationship Modelling
, Object/relational mapping
Expand
Object-relational mapping (ORM, O/RM, and O/R mapping tool) in computer science is a programming technique for converting data between incompatible…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adobe ColdFusion
Apache OpenJPA
Castle Project:MonoRail
Catalyst (software)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Object-Relational Mapping
Josh Juneau
2013
Corpus ID: 59791899
For years, the Java Database Connectivity API (JDBC) was the standard for working with databases in a web or desktop Java…
Expand
2010
2010
Recursive Queries Using Object Relational Mapping
Marta Burzanska
,
K. Stencel
,
Patrycja Suchomska
,
Aneta Szumowska
,
Piotr Wisniewski
Future Generation Information Technology
2010
Corpus ID: 8050668
Recent years witnessed continuous development of database query languages and object relational mappers. One of the research…
Expand
2009
2009
Object-relational mapping with SqueakSave
T. Kowark
,
R. Hirschfeld
,
M. Haupt
International Workshop on Smalltalk Technologies
2009
Corpus ID: 7587592
Object persistence is an important aspect of application architectures and development processes. Different solutions in this…
Expand
2006
2006
Type-Safe Two-Level Data Transformation
Alcino Cunha
,
J. Oliveira
,
Joost Visser
World Congress on Formal Methods
2006
Corpus ID: 12856913
A two-level data transformation consists of a type-level transformation of a data format coupled with value-level transformations…
Expand
Highly Cited
2004
Highly Cited
2004
Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation
Jun Yu Li
,
Minho Sung
,
Jun Xu
,
Erran L. Li
IEEE Symposium on Security and Privacy…
2004
Corpus ID: 16907782
Tracing attack packets to their sources, known as IP traceback, is an important step to counter distributed denial-of-service…
Expand
Highly Cited
2000
Highly Cited
2000
La condición actual de los recursos forestales en México: resultados del Inventario Forestal Nacional 2000
J. L. Palacio-Prieto
,
G. Bocco
,
+13 authors
F. G. Medrano
2000
Corpus ID: 129461599
Resumen es: A partir de fines de 1999. la SEMARNAP decidio desarrollar la primera fase dei inventario forestal nacional de Mexico…
Expand
Highly Cited
1997
Highly Cited
1997
Beyond dualism – the social construction of nature and the natural and social construction of human beings
Judith Gerber
1997
Corpus ID: 10155447
The dualism between society and nature and the processes by which nature is being socially constructed has become an area of…
Expand
Highly Cited
1993
Highly Cited
1993
Organizational Demography and Turnover: An Examination of Multiform and Nonlinear Heterogeneity
J. Alexander
,
B. Nuchols
,
J. Bloom
,
S. Lee
1993
Corpus ID: 52886159
This paper advances the study of organizational demography and turnover by testing propositions derived from Blau's theory of…
Expand
Highly Cited
1988
Highly Cited
1988
Loglinear multidimensional IRT models for polytomously scored items
H. Kelderman
,
Carl P. M. Rijkes
1988
Corpus ID: 30528290
A loglinear IRT model is proposed that relates polytomously scored item responses to a multidimensional latent space. The analyst…
Expand
Highly Cited
1984
Highly Cited
1984
On Reich's strong convergence theorems for resolvents of accretive operators
W. Takahashi
,
Yoichi Ueda
1984
Corpus ID: 123118211
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE