I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
Administration of Temp Tablespace and Undo Tablespace in Or..:
, In:
Retracted on March 1, 2022 Proceedings of the 2018 International Conference on Information Hiding and Image Processing
,
Wang, Er-nuan
;
Chen, Liang
- p. 1-4 , 2018
Link:
https://dl.acm.org/doi/10.1145/3292425.3292439
RT T1
Retracted on March 1, 2022 Proceedings of the 2018 International Conference on Information Hiding and Image Processing
: T1
Administration of Temp Tablespace and Undo Tablespace in Oracle
UL https://suche.suub.uni-bremen.de/peid=acm-3292439&Exemplar=1&LAN=DE A1 Wang, Er-nuan A1 Chen, Liang PB ACM YR 2018 K1 Temporary tablespace K1 Undo tablespace K1 Information systems K1 Data management systems K1 Database management system engines K1 Information systems applications K1 Computing platforms K1 Security and privacy K1 Network security K1 Security protocols K1 Software and application security K1 Software security engineering K1 Networks K1 Network protocols K1 Network protocol design K1 Computing methodologies K1 Artificial intelligence K1 Computer vision K1 Image and video acquisition K1 Human-centered computing K1 Visualization K1 Visualization techniques K1 Graph drawings K1 Theory of computation K1 Design and analysis of algorithms K1 Mathematical optimization K1 Planning and scheduling K1 Planning for deterministic actions K1 Control methods K1 Computational control theory K1 Network services K1 Network management SP 1 OP 4 LK http://dx.doi.org/https://dl.acm.org/doi/10.1145/3292425.3292439 DO https://dl.acm.org/doi/10.1145/3292425.3292439 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)