Preview
Unable to display preview. Download preview PDF.
Literaturverzeichnis
Bachmann, C.W.: Implementation Techniques for Data Structure Sets, in: Data Base Management Systems, D.A. Jardine (ed.), North-Holland Publishing Company, 1974, 00. 147–157.
Byrom, S.T., Hardgrave, W.T.: Representation of Sets on Mass Storage Devices for Information Retrieval Systems, in: AFIPS, Proc. National Computer Conference, 1973, pp. 245–250.
Chamberlin, D.D., Boyce, R.F.: SEQUEL: A Structured English Query Language, in: Proc. of 1974 ACM SIGFIDET Workshop, Ann Arbor, Michigan, April 1974.
CODASYL DATA BASE TASK GROUP, (DBTG) REPORT, April 1971, erhältlich bei IFIP Data Processing Group, Stadhouderskade, Amsterdam (IAG).
Codd, E.F.: A relational Model of Data for Large Shared Data Banks, in: CACM, Vol. 13, No. 6, 1970, pp. 377–387.
Härder, T.: Implementierung von Zugriffspfaden durch Bitlisten, Forschungsbericht DV 74-2, FG Datenverwaltungssysteme, TH Darmstadt, 1974.
Krägeloh, K.-D., Lockemann, P.C.: Schichten von Datenmodellen und Datenbanksprachen, Sommer-Seminar 1974, GMD, Seminarunterlagen.
Martin, L.D.: A Model for File Structure Determination for Large On-Line Data Files, in: File Organization, Selected Papers from File 68, IAG Conference, Swets u. Zeitlinger, N.V.-Amsterdam, 1969, pp. 223–245.
Schröder, K.: Vergleich der Verweistechniken in Datenbanksystemen: Adreßkettung contra Indextabellen, in: Angewandte Informatik, Heft 4/1972, S. 145–153.
Senko, M.E. et al.: Data structures and accessing in data base systems, in: IBM Systems Journal, Vol. 12, 1973, No. 1, pp. 30–93.
Wang, C.P.: Parametrization of information system application, IBM Research Report, RJ 1199, April 11, 1973.
Wedekind, H.: On the selection of access paths in a data base system, in: Data Base Management, North-Holland Publ. Comp., 1974, S. 385–397.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1975 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Härder, T. (1975). Implementierung von Zugriffspfaden durch Bitlisten. In: Mülbacher, J. (eds) GI — 5. Jahrestagung. GI 1975. Lecture Notes in Computer Science, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-07410-4_645
Download citation
DOI: https://doi.org/10.1007/3-540-07410-4_645
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-07410-6
Online ISBN: 978-3-540-37929-4
eBook Packages: Springer Book Archive