Volume 30,
Number 1,
March 2001
Articles
Database Principles
Influential Papers
Reports
Standards
Systems & Prototypes
Volume 30,
Number 2,
June 2001
Timos K. Sellis,
Sharad Mehrotra (Eds.):
Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data,
May 21-24,
2001,
Santa Barbara,
CA,
USA. SIGMOD Record 30(2) ACM 2001,
ISBN 1-58113-332-4
Contents
Volume 30,
Number 3,
September 2001
Advanced XML Data Processing
- Karl Aberer:
Advanced XML Data Processing - Guest Editor's Introduction.
11-13
- Peter Fankhauser:
XQuery Formal Semantics: State and Challenges.
14-19
- Jayavel Shanmugasundaram, Eugene J. Shekita, Jerry Kiernan, Rajasekar Krishnamurthy, Stratis Viglas, Jeffrey F. Naughton, Igor Tatarinov:
A General Techniques for Querying XML Documents using a Relational Database System.
20-26
- Albrecht Schmidt, Florian Waas, Martin L. Kersten, Daniela Florescu, Michael J. Carey, Ioana Manolescu, Ralph Busse:
Why And How To Benchmark XML Databases.
27-32
- Wei Han, David Buttler, Calton Pu:
Wrapping Web Data into XML.
33-38
- Dan Suciu:
On Database Theory and XML.
39-45
- Shu-Yao Chien, Vassilis J. Tsotras, Carlo Zaniolo:
XML Document Versioning.
46-53
- Bertram Ludäscher, Richard Marciano, Reagan Moore:
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives.
54-63
Articles
- David B. Lomet:
The Evolution of Effective B-tree: Page Organization and Techniques: A Personal Account.
64-69
- Asterio K. Tanaka, Patrick Valduriez:
The Ecobase Project: Database and Web Technologies for Environmental Information Systems.
70-75
- Nam Huyn:
Data Analysis and Mining in the Life Sciences.
76-85
Distinguished Database Profiles
- Marianne Winslett:
Jeffrey D. Ullman Speaks Out on the Future of Higher Education, Startups, Database Theory, and More.
86-94
Reports
Influential Papers
Standards
Surveys
Career Forum
Volume 30,
Number 4,
December 2001
Data Mining for Intrusion Detection and Threat Analysis
- Daniel Barbará:
Special Issue on Data Mining for Intrusion Detection and Threat Analysis - Guest Editor's Introduction.
4
- Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin:
Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project.
5-14
- Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu:
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection.
15-24
- João B. D. Cabrera, Lundy M. Lewis, Raman K. Mehra:
Detection and Classification of Intrusions and Faults using Sequences of System Calls.
25-34
- Wenke Lee, Wei Fan:
Mining System Audit Data: Opportunities and Challenges.
35-44
- Yücel Saygin, Vassilios S. Verykios, Chris Clifton:
Using Unknowns to Prevent Discovery of Association Rules.
45-54
- Olivier Y. de Vel, Alison Anderson, Malcolm Corney, George M. Mohay:
Mining Email Content for Author Identification Forensics.
55-64
Book Reviews
Distinguished Database Profiles
- Marianne Winslett:
Gio Wiederhold Speaks Out on Moving into Academia in Mid-Career, How to Be an Effective Consultant, Why You Should Be a Program Manager as a Funding Agency, the Need for Ontology Algebra and Simulations, and More.
71-79
Database Principles
Industry Perspectives
Influential Papers
Reports
Standards
Systems and Prototypes
Career Forum
Research Centers
Copyright © Fri Mar 12 17:32:25 2010
by Michael Ley (ley@uni-trier.de)