• Keine Ergebnisse gefunden

LIDAS: A database system for the personal computer Lilith : the database management

N/A
N/A
Protected

Academic year: 2021

Aktie "LIDAS: A database system for the personal computer Lilith : the database management"

Copied!
47
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Research Collection

Report

LIDAS

A database system for the personal computer Lilith : the database management

Author(s):

Rebsamen, Jürg; Reimer, Manuel; Ursprung, Peter; Zehnder, Carl August Publication Date:

1982

Permanent Link:

https://doi.org/10.3929/ethz-a-000351842

Rights / License:

In Copyright - Non-Commercial Use Permitted

This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use.

ETH Library

(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
(29)
(30)
(31)
(32)
(33)
(34)
(35)
(36)
(37)
(38)
(39)
(40)
(41)
(42)
(43)
(44)
(45)
(46)
(47)

Referenzen

ÄHNLICHE DOKUMENTE

Beavis, “Radars, a bioinformatics solution that automates proteome mass spectral analysis, optimises protein identification, and archives data in a relational database,”

Mit "QBiQ" (sprich wie im Englischen für "cubic") wurde schließlich vom Sfb ein Datenbanksystem entwickelt, mit dem nicht nur qualitative und quantitative

Because most of our projects combine qualitative and quantitative methods in longitudinal panel studies, unique verbal and standardised data sets are available with an

Implement the straightforward approach to load auth.tsv to the database (PostgreSQL, Java/Python)?.

Implement the straightforward approach to load auth.tsv to the database (PostgreSQL, Java/Python)..

Task 1: Implement the straightforward approach to load auth.tsv to the database (PostgreSQL, Java).. Task 2: The straightforward approach

If some active participating site does not contain a <ready T> record in its log, then the failed coordinator C i cannot have decided to commit T.. If none of the above

Welche Vor- und Nachteile lassen sich aus dem Fakt ableiten, dass der Benutzer keinerlei wissen über etwaige Zugriffspfade hat?. Wie lässt sich das im System R beschriebene