|
[1]Y. Chen and Y. Chen. “Signature file hierarchies and signature graphs: a new index method for object-oriented databases,” In Proceedings of the 2004 ACM symposium on Applied computing, SAC ’04, pages 724–728, New York, NY,USA, 2004. ACM.
[2]K. R. Choi and K. C. Kim. “T*-tree: a main memory database index structure for real time applications.” In Proceedings of the Third International Workshop on Real-Time Computing Systems Application, RTCSA ’96, pages 81, Washington, DC, USA, 1996. IEEE Computer Society.
[3]Hsql Database. http://hsqldb.org/.
[4]U. Deppisch. “S-tree: a dynamic balanced signature index for office retrieval.” In Proceedings of the 9th annual international ACM SIGIR conference on Research and development in information retrieval, SIGIR ’86, pages 77–87, New York, NY, USA, 1986. ACM.
[5]H2DB. http://www.h2database.com/.
[6]T. J. Lehman and M. J. Carey. “A study of index structures for main memory database management systems.” In Proceedings of the 12th International Conference on Very Large Data Bases, VLDB ’86, pages 294–303, San Francisco, CA, USA, 1986. Morgan Kaufmann Publishers Inc.
[7]T. J. Lehman. “Design and performance evaluation of a main memory relational database system (t tree).” PhD thesis, 1986. AAI8621915.
[8]H. Lu, Y. Y. Ng, and Z. Tian. “T-tree or b-tree: Main memory database index structure revisited.” In Proceedings of the Australasian Database Conference, ADC’00, pages 65–, Washington, DC, USA, 2000. IEEE Computer Society.
[9]I. E. Shanthi, Y. Izaaz, and R. Nadarajan. “On the sd-tree construction for optimal signature operations.” In Proceedings of the 1st Bangalore Annual Compute Confer- ence, COMPUTE ’08, pages 14:1–14:8, New York, NY, USA, 2008. ACM.
[10]P. L. Suei, Y. F. Lu, R. J. Liao, and S. W. Lo. “A signature-based grid index design for main-memory rfid database applications.” J. Syst. Softw., 85(5):1205–1212, May 2012.
[11]E. Tousidou, P. Bozanis, and Y. Manolopoulos. “Signature-based structures for objects with set-valued attributes.” Inf. Syst., 27(2):93–121, April 2002.
[12]E. Tousidou, A. Nanopoulos, and Y. Manolopoulos. “Improved methods for signature-tree construction.” Comput. J., 43(4):300–313, December 2000.
[13]X. Zhang, L. Cheng, and Q. Zhu. “Improvement of filtering algorithm for rfid middleware using kdb-tree query index.” JSW, 6(12):2521–2527, 2011.
[14]Jvm ti. http://java.sun.com/javase/6/docs/technotes/guides/jvmti/.
[15]H. Garcia-Molina and K. Salem. “Main memory database systems: An overview.” IEEE Trans. on Knowl. and Data Eng., 4(6):509–516, 1992.
[16]K. M. Zuberi and K. G. Shin. “Emeralds: A small-memory real-time microkernel.” IEEE Trans. Softw. Eng., 27(10):909–928, 2001.
[17]D. Dervos, Y. Manolopoulos, and P. Linardis. “Comparison of signature file models with superimposed coding.” Inf. Process. Lett., 65(2):101–106, 1998.
[18]K. Finkenzeller. “RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification.” John Wiley &; Sons, Inc., New York, NY, USA, 2003.
[19]P. Kocher, R. Lee, G. McGraw, and A. Raghunathan. “Security as a new dimension in embedded system design.” In DAC ’04: Proceedings of the 41st annual conference on Design automation, pages 753–760, New York, NY, USA, 2004. ACM. Moderator-Srivaths Ravi.
[20]K. Kwon, Y. Yi, D. Kim, and S. Ha. Embedded software generation from system level specification for multi-tasking embedded systems. In ASP-DAC ’05: Proceedings of the 2005 conference on Asia South Pacific design automation, pages 145–150, New York, NY, USA, 2005. ACM.
[21]W. Lee and D. Lee. “Signature file methods for indexing object-oriented database systems.” In Proceedings of the 2nd International Computer Science Conference, 1992.
[22]C.-T. Lo, M. Chang, O. Frieder, and D. Grossman. “The object behavior of java object-oriented database management systems.” pages 247–252, April 2002.
|