• Aucun résultat trouvé

Grundlagen von Datenbanken – A 30 years review (nearly)

N/A
N/A
Protected

Academic year: 2022

Partager "Grundlagen von Datenbanken – A 30 years review (nearly)"

Copied!
1
0
0

Texte intégral

(1)

”Grundlagen von Datenbanken” – a 30 years review (nearly)

[Abstract]

Rainer Manthey

Rheinische Friedrich-Wilhelms-Universität Bonn

manthey@informatik.uni-bonn.de

ABSTRACT

In May 1989, a first workshop entitled ”Grundlagen von Da- tenbanken” was organized by founder members of a newly established GI working group (”Arbeitskreis”) with the sa- me name. Nobody among the organizers and the numerous attendees of this initial event even dared to hope at that time that ”GvDB” would still be alive both as a working group (by now the oldest in GI) as well as a regular annual event in 2018! As young (and not so young) DB scientists will come together for the 30st time this year in Wuppertal, looking back to 1989 and reviewing what has been achieved since then may be a worthwhile activity.

30thGI-Workshop on Foundations of Databases (Grundlagen von Daten- banken), 22.05.2018 - 25.05.2018, Wuppertal, Germany.

Copyright is held by the author/owner(s).

Références

Documents relatifs

Application A1 on host H1 and application A2 on host H2 first get in contact using the standard IP over ATM to exchange their ATM address (atm1, atm2) and to define a

This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS

Proposed requirements for policy management look very much like pre-existing network management requirements [2], but specific models needed to define policy itself and

This will cause the master node to transition back to the normal state, logically block non-control frames on the secondary port, flush its own bridge table, and send a

While there is no requirement for servers to maintain history information, if the server has sufficient history to allow it to reliably determine which entries in the prior

The User Control and Communication Module (UCC) implements protocol sufficient for a process to communicate with a foreign HOST’s logger and to make initial

When NETED is used to create a file (that is, when it is invoked from command level with an argument which specifies the name of a file which does not already exist in the

The PHIB is inserted into a bundle by a forwarding node to provide the endpoint identifier (EID) of an endpoint of which the forwarding node is a member so that this EID may