default search action
Encyclopedia of Database Systems 2009: Subject Index - S
- Ling Liu, M. Tamer Özsu
:
Encyclopedia of Database Systems. Springer US 2009, ISBN 978-0-387-35544-3
S
- Safe plan, 2154, 2155
- Safe query, 2151-2153, 2463
- Safety and Domain Independence, 2463-2466
- Saga(s), 1222, 1979, 2466-2467, 2824, 2826
- Sample and count, 2839
- Sampling, 630-633, 1912, 2467
- SAN File System, 2467-2468
- SAN islands, 1575
- SAN management in multi-vendor environments, 2806
- Sarbanes-Oxley Act, 2364
- SAS, 2824-2826
- SATA, 2824-2826
- Satisfiability problem, 1397, 1398
- SAX/DOM, 3598-3600
- SBQL, 2771-2772
- SCA assembly model, 2632
- SCA component, 2632
- Scalability, 133, 2045, 2403-2407
- Scalable Decision Tree Construction, classification, 2469-2473
- Scale-out, 2403-2407
- Scale-up, 2031, 2032
- Scatterplots, 1335, 1338
- Scene(s), 3309, 3311
- Scheduling, 719-721
- Scheduling Strategies for Data Stream
- Processing, 2475-2479
- Schema, 1940-1941, 2494-2497
- Schema-driven storage, 3630
- Schema evolution, 2479-2481
- Schema mapping, 1492-1494, 2481-2493
- Science application, 748-750
- Scientific data, 2506, 3225-3227, 3230
- Scientific databases, 2202-2206, 2339, 2502-2505
- Scientific query, 2264
- Scientific query language, 2264, 2266
- Scientific simulations, 733-738
- Scientific workflows, 2507-2510
- Scientific workflow tasks, 2507
- Scope of rights, 1014
- Scraper (-ing), 2511
- SCSI, 2512
- SD-Rtree, 921, 923, 924
- Searchable compressed format, 1442, 1447
- Search advertising, 3458
- Search algorithms, 739-741
- Search engine metric, 2513-2518
- Search engines, 1251-1254, 1463-1466, 2513-2518, 3462, 3464
- Search engine selection, 1730-1732, 1734
- Search space, 739, 740
- Search tasks, 3480
- Secondary index, 2522-2528
- Secondary storage, 1707
- Second chance (replacement policy), 283
- Second normal form (2NF), 2522
- Second principal component, 2136
- Secret-key encryption, 572, 2897
- Secure database development, 2528-2534
- Secure database development using patterns, 2530-2531
- Secure data outsourcing, 2523-2528
- Secure multiparty computation (SMC), 2148, 2149, 2535-2539
- Secure transaction processing, 1789, 1791, 2540-2545
- Security, 728-732
- Security requirement in secure data outsourcing, 2524-2525, 2528
- Security services, 2546-2547
- Security services (No. 1481), 2546-2547
- Segmentation, 1389-1395
- Selection, 2547
- Selective dissemination of information (SDI), 1482
- Selectivity, 2739-2741
- Selectivity estimation, 2548, 2739-2741
- Self describing, 2607
- Self-describing data, 1265
- Self-monitoring, 2552, 2554
- Self-organizing map (SOM), 3356
- Self-tuning histograms, 743
- Semantic(s), 132, 2576-2579, 3017
- Semantic/syntactic information, 939
- Semantic web, 1546, 1547, 1550, 2579-2587, 3076-3079, 3472
- Semantic web services (SWS), 2586-2587, 3513-3519
- Semi-automated web data extraction tools, 1283
- Semijoin, 904, 906, 1581, 2592-2595
- Semijoin program, 2595-2598
- Semiology, 1335
- Semiotics, 1334
- Semi-streaming model, 1271-1274
- Semi-structured, 1915, 2599-2600
- Semi-supervised clustering, 393-396, 2613
- Semi-supervised learning, 393, 2613-2615
- Sender anonymity, 91
- Sender pseudonymity, 2207
- Sensor databases, 107-110
- Sensor data model, 489-490
- Sensor network indexing, 636-637
- Sensor networks, 574, 710-713, 1538-1540, 1542, 2278-2281, 2616-2619
- Sensor selection, 583
- Sensory gap, 1115, 1116, 3361-3363
- Sentence segmentation, 3072, 3073
- Sentiment analysis, 1986-1990
- SEQUEL, 2753, 2754, 2760
- Sequence database, 2621-2623
- Sequence matching, 837, 3315
- Sequenced, 2619-2621
- Sequential composition, 419, 420
- Sequential I/O, 1333
- Sequential pattern and sequential association rules, 140
- Serializability, 1642, 2383, 2385, 2591, 2626-2631, 2761, 2762
- Server-side scripting languages, 954
- Service component architecture (SCA), 2632-2633
- Service composition, 1697
- Service consumers, 2634, 2635
- Service oriented architecture (SOAs), 328-329, 414, 997-999, 2004, 2633-2636
- Service outsourcing, 2523
- Service producers, 2634, 2635
- Session beans, 1579
- Session consistency, 2636
- Session property, 2856, 3452, 3453
- Set abstraction, 420-421
- SGML, 3124
- Shared-disk, 2637
- Shared-memory, 2638
- Shared-memory architecture, 2028, 2638-2639
- Shared nothing partitioning, 2109, 2112
- Ship whole, 904-907
- Short-range wireless communication protocols, 1751
- Short running processes (microflows), 3166
- Shot-cut detection, 3309-3311
- Shot(s), 3308-3311, 3316-3320
- Side-effect free translation of view update, 2639, 2641
- Side-effect-free view updates, 2639-2642
- Side-effects, 2639-2642
- Signal detection theory, 2349
- Signatures, 2642-2646
- Signature unblinding, 252
- SilkRoute, 3614, 3615
- Similarity, 1451, 1452, 2647-2651
- Simple metadata model, 947
- Simplicial complex, 2651-2656
- Simulation, 3525-3528, 3551
- Single client-server architecture, 342
- Single instruction multiple data (SIMD) instructions, 129
- Single-link clustering, 3045
- Single query optimization, 1849
- Single-site illusion, 451
- Single stream query, 2475, 2476
- Singular value decomposition (SVD), 2045, 2657-2658
- Situational applications, 593
- Situation reinforcement, 2431, 2432
- Sketch, 511-515, 2898, 2899
- Sketching, 89
- Skewed distribution, 634
- Sliding versus predicate windows, 3533
- Sliding windows, 137, 138, 2845-2846
- SMI-S (Storage Management Initiative-Specification), 1552
- Snake model, 1390-1393
- Snapshot(s), 2383, 2385, 3328
- Snippet, 2664-2665
- SOAP (Simple Object Access Protocol), 2666-2667, 3572
- SOA systems, 2634-2636
- Social applications, 2667
- Social network analysis (SNA), 2668, 2669, 2672
- Social networks, 2415, 2667-2672
- Social tagging, 1522
- Soft hardware failures, 100
- Software layer within a database management system, 2807
- Software measurement, 2232
- Software non-determinism, 100
- Software transactional memory (STM), 2672-2673
- Sort-Merge join, 1026, 1027, 2673-2674
- Source-to-target dependency, 576
- Space-filling curves (SFC), 2674-2680
- Space partitioning index, 1439, 1440
- Spam detection, 3520-3523
- Sparse index, 1433, 1434
- Spatial, 2725-2729
- access method, 368, 373, 2454, 2459
- anonymity, 2685-2690
- data, 3132
- data analysis, 2691-2695
- databases, 71-77, 368, 369, 372, 373, 1639, 2459
- data management system (SDMS), 3684, 3685
- data mining, 2691, 2692, 2695-2698
- data structures, 2219-2224
- data type, 2681-2683, 2685, 2698-2702
- extenders, 3142
- hash joins, 2710
- histogram, 2740
- hotspots, 2695, 2696, 2698
- indexing, 2224
- indexing techniques, 2702-2707
- join, 2707-2714
- join methods, 2708
- k-anonymity (SKA), 2686-2688, 2690
- locality, 1713-1714
- monitoring method, 479
- network, 2698
- network databases, 2714-2719
- objects, 2719, 2720, 3140, 3141
- operation(s), 2699-2701, 2719-2724
- outliers, 2695, 2696, 2698
- partition, 2699-2701
- pattern families, 2695
- projection, 2737
- queries, 3383, 3386
- range query, 2325
- SQL, 3142, 3143
- and spatio-temporal data models, 2681-2685
- uncertainty model, 2161, 2162
- Spatio-temporal, 2725-2730, 2736-2738
- Spatio-temporal distance join query (STDJQ), 2740, 2741
- Spatio-temporal trajectories, 2742-2746
- Spatiotemporal window query (STWQ), 2739-2740
- SPC algebra, 449
- SPCU-algebra, 2124-2125
- Special case of range query, 1707
- Specialization, 2746-2747, 3017
- Specificity, 2747-2748
- Spectral feature, 161
- Speed-up, 2031, 2032, 2035
- Spider, 1418
- SPJRU-algebra, 2124-2125
- Split
- Spoiler, 963
- SQL, 2753-2760, 2762-2768, 3018-3023
- SQL isolation levels, 2761-2762
- SQL standard, 1925
- SQL/temporal, 3192, 3193, 3197
- SQL/XML, 3606, 3614, 3615
- SQuery languages, 2583-2586
- SRAM, 2195, 2196
- S-reducibility, 2620-2621
- SRU, 2519, 2521
- SSD, 2799, 2800
- Stack-based architecture, 2772
- Staged database, 2773-2776
- Staleness, 2388, 2389
- Standard effectiveness evaluation in IR, 2776
- Standard effectiveness measures, 2776-2779
- Standard generalized markup language (SGML), 1927
- Standard storage management interface, 2806
- Standardized metadata set, 947
- Standards for obtaining copyright, 497
- Stand-by mode, 2821, 2822
- Star index, 2779
- Star or snowflake schema, 2779
- Star schema, 658, 661, 2014
- State-based publish/subscribe, 2780-2782
- Statechart, 3554, 3555
- State diagram, 41, 42, 45
- State equivalence, 1071
- Stateful methods, 1688
- Stateless methods, 1688
- State-machine replication, 2392, 2393
- Statement-level triggers, 738
- Statement replication, 1740-1741
- State transition, 355
- Static dynamic caching (SDC), 3502
- Static random access memory (SRAM), 1669
- Stationary MSN, 1756
- Statistical database, 2467
- Statistical data management, 2782
- Statistical disclosure control (SDC), 1472, 1473, 2357
- Statistical disclosure limitation, 1698
- Statistical disclosure limitation for data access, 2783-2789
- Statistical estimation, 634
- Statistical method, 263
- Statistical test, 318-321
- Statistics, 236-238
- Statistics databases, 2333
- Steganographic techniques, 2789
- Steganography, 826, 2789-2790
- Steganography vs. watermarking, 2789
- Stemming, 1610, 2790-2793, 3492-3493
- Stop-&-Go operator, 2794
- Stoplists, 2794-2796
- Stopwords, 2794, 2795
- Storage access model, 2796-2797
- Storage and management, 344-348
- Storage area network (SAN), 2467-2468, 2797-2798
- Storage consolidation, 2798
- Storage device, 1574, 1575, 1900, 2798-2800
- Storage grid, 2800-2802
- Storage layer concepts, 2808
- Storage management, 2802-2806
- Storage manager, 2807-2812
- Storage mapping strategies, 3627
- Storage network architecture (SAN), 1574, 1575, 2812-2815
- Storage Networking Industry Association (SNIA), 1499, 1552, 2806, 2807, 2815-2816
- Storage networks, 1552
- Storage of Large Scale Multidimensional Data, 2816-2821
- Storage power management, 2821-2823
- Storage protection, 2823-2824
- Storage protocol, 2824-2827
- Storage resource management, 2827
- Storage resource management software tools, 2827
- Storage security, 2827-2829
- Storage virtualization, 1659, 2830
- Storage volume identifier, 1658-1659
- Stored procedure, 2831
- STORM, 2782
- Story identification, 3281, 3283, 3285
- Streambased versus operation-based windows, 3533
- Stream ciphers, 572
- Stream fault-tolerance, 1109-1114
- Stream high availability, 1109-1114
- Stream incremental evaluation, 3533
- Streaming algorithm, 1948-1949
- Streaming applications, 2847-2848
- Stream mining, algorithms, 2831-2833
- Stream-oriented Query Languages and Operators, 2848-2853
- Stream-oriented representation, 943-944
- Stream processing, 1633, 1635, 2837-2838
- Stream processing enginer (SPE), 639-641
- STREAM project, 1634
- Stream query language, 2849
- Stream query processing, 3533, 3536, 3537
- Stream replication, 1110, 1113, 1114
- Stream scheduling (session scheduling), 1832-1834
- 5S (Streams, Structures, Scenarios, Spaces, and Societies) framework, 268
- String similarity, 2355, 2357
- Structural relationship, 2376
- Structural summaries, 606, 2858-2860
- Structure, 2377, 2862, 3036, 3037
- Structured document retrieval, 2867-2868
- Structured overlays, 1628-1630
- Structured Query Language, 2753
- Structured text retrieval, 2867-2868
- Structure indexing, 2857-2861
- Study of signs, 1334
- Subgraph isomorphism, 1170-1171
- Subject space, 2871-2872
- Subscription language, 465
- Subscription processing with complex predicates, 2071
- Subshot segmentation, 3281, 3284, 3285
- Subtransactions, 1142, 2588-2590
- Succinct constraints, 2876
- Suffix, 2790-2793
- Summarizability, 2880-2883
- Summarization, 2884-2889
- Summary database, 2880
- Summary graph, 2857
- Summary statistics, 2882
- Superkey, 1587, 1588
- Supervised learning, 1664
- Supply chain management process engineering, 296-297
- Support, 124-126
- Support of a graph, 1171
- SVM, 2890-2892
- SVR, 2890
- SWS framework, 2587
- Symbolic representation, 2897
- Symmetric multiprocessors (SMP), 2638
- Synchronization protocols, 445
- Synchronous propagation, 2856
- Synopsis, 634, 2898-2899
- Syntactic structures, 982, 983
- Synthetic microdata, 1475, 2899-2900
- System configuration, 2551-2552
- System dynamics, 3527
- System R, 2289, 2290, 2293, 2754, 2760, 2900-2905
- System (crash) recovery, 1643-1644
- Systems biology, 1266-1270
- Systems biology ontology, 1960
- Systems medicine, 360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.