Kumar, V., and Hsu, M. [1998] Recovery Mechanisms in
Database Systems, Prentice-Hall (PTR), 1998.
Kumar, V., and Song, H. S. [1998] Database Recovery,
Kluwer Academic, 1998.
Kung, H., and Robinson, J. [1981] “Optimistic
Concurrency Control,” TODS, 6:2, June 1981.
Lacroix, M., and Pirotte, A. [1977a] “Domain-Oriented
Relational Languages,” in VLDB [1977].
Lacroix, M., and Pirotte, A. [1977b] “ILL: An English
Structured Query Language for Relational Data Bases,”
in Nijssen [1977].
Lai, M.-Y., and Wilkinson, W. K. [1984] “Distributed
Transaction Management in Jasmin,” in VLDB [1984].
Lamb, C. et al. [1991] “The ObjectStore Database System,”
in CACM, 34:10, October 1991, pp. 50–63.
Lamport, L. [1978] “Time, Clocks, and the Ordering of
Events in a Distributed System,” CACM, 21:7, July
1978.
Lander, E. [2001] “Initial Sequencing and Analysis of the
Genome,” Nature, 409:6822, 2001.
Langerak, R. [1990] “View Updates in Relational
Databases with an Independent Scheme,” TODS, 15:1,
March 1990.
Lanka, S., and Mays, E. [1991] “Fully Persistent B1-Trees,”
in SIGMOD [1991].
Larson, J. [1983] “Bridging the Gap Between Network and
Relational Database Management Systems,” IEEE
Computer, 16:9, September 1983.
Larson, J., Navathe, S., and Elmasri, R. [1989] “Attribute
Equivalence and its Use in Schema Integration,” TSE,
15:2, April 1989.
Larson, P. [1978] “Dynamic Hashing,” BIT, 18, 1978.
Larson, P. [1981] “Analysis of Index-Sequential Files with
Overflow Chaining,” TODS, 6:4, December 1981.
Lassila, O. [1998] “Web Metadata: A Matter of Semantics,”
IEEE Internet Computing, 2:4, July/August 1998, pp.
30–37.
Laurini, R., and Thompson, D. [1992] Fundamentals of
Spatial Information Systems, Academic Press, 1992.
Lausen G., and Vossen, G. [1997] Models and Languages
of Object Oriented Databases, Addison-Wesley, 1997.
Lazebnik, S., Schmid, C., and Ponce, J. [2004] “Semi-Local
Affine Parts for Object Recognition,” in Proc. British
Machine Vision Conference, Kingston University, The
Institution of Engineering and Technology, U.K., 2004.
Lee, J., Elmasri, R., and Won, J. [1998] “An Integrated
Temporal Data Model Incorporating Time Series
Concepts,” DKE, 24, 1998, pp. 257–276.
Lehman, P., and Yao, S. [1981] “Efficient Locking for
Concurrent Operations on B-Trees,” TODS, 6:4,
December 1981.
Lehman, T., and Lindsay, B. [1989] “The Starburst Long
Field Manager,” in VLDB [1989].
Leiss, E. [1982] “Randomizing: A Practical Method for
Protecting Statistical Databases Against Compromise,”
in VLDB [1982].
Leiss, E. [1982a] Principles of Data Security, Plenum
Press, 1982.
Lenat, D. [1995] “CYC: A Large-Scale Investment in
Knowledge Infrastructure,” CACM 38:11, November
1995, pp. 32–38.
Lenzerini, M., and Santucci, C. [1983] “Cardinality
Constraints in the Entity Relationship Model,” in ER
Conference [1983].
Leung, C., Hibler, B., and Mwara, N. [1992] “Picture
Retrieval by Content Description,” in Journal of
Information Science, 1992, pp. 111–119.
Levesque, H. [1984] “The Logic of Incomplete Knowledge
Bases,” in Brodie et al., Ch. 7 [1984].
Li, W.-S., Seluk Candan, K., Hirata, K., and Hara, Y. [1998]
Hierarchical Image Modeling for Object-based Media
Retrieval in DKE, 27:2, September 1998, pp. 139–176.
Lien, E., and Weinberger, P. [1978] “Consistency,
Concurrency, and Crash Recovery,” in SIGMOD
[1978].
Lieuwen, L., and DeWitt, D. [1992] “A Transformation-
Based Approach to Optimizing Loops in Database
Programming Languages,” in SIGMOD [1992].
Lilien, L., and Bhargava, B. [1985] “Database Integrity
Block Construct: Concepts and Design Issues,” TSE,
11:9, September 1985.
Lin, J., and Dunham, M. H. [1998] “Mining Association
Rules,” in ICDE [1998].
Lindsay, B. et al. [1984] “Computation and
Communication in R*: A Distributed Database
Manager,” TOCS, 2:1, January 1984.
Lippman R. [1987] “An Introduction to Computing with
Neural Nets,” IEEE ASSP Magazine, April 1987.
Lipski, W. [1979] “On Semantic Issues Connected with
Incomplete Information,” TODS, 4:3, September 1979.
Lipton, R., Naughton, J., and Schneider, D. [1990]
“Practical Selectivity Estimation through Adaptive
Sampling,” in SIGMOD [1990].
Liskov, B., and Zilles, S. [1975] “Specification Techniques
for Data Abstractions,” TSE, 1:1, March 1975.
Litwin, W. [1980] “Linear Hashing: A New Tool for File
and Table Addressing,” in VLDB [1980].
Liu, B. [2006] Web Data Mining: Exploring Hyperlinks,
Contents, and Usage Data (Data-Centric Systems and
Applications), Springer, 2006.
Liu, B. and Chen-Chuan-Chang, K. [2004] “Editorial:
Special Issue on Web Content Mining,” SIGKDD
Explorations Newsletter 6:2 , December 2004, pp. 1–4.
Liu, K., and Sunderraman, R. [1988] “On Representing
Indefinite and Maybe Information in Relational
Databases,” in ICDE [1988].
1118 Bibliography