Sciweavers

36 search results - page 3 / 8
» Authorization Analysis of Queries in Object-Oriented Databas...
Sort
View
DEXAW
1995
IEEE
101views Database» more  DEXAW 1995»
13 years 9 months ago
Principles and Tools for Authoring Knowledge-Rich Documents
Digital libraries can take advantage of documents that have their content (semantics) explicitly represented as knowledge structures. These knowledge-rich documents can be created ...
Robert P. Futrelle, Natalya Fridman Noy
ICSE
2004
IEEE-ACM
14 years 5 months ago
Static Checking of Dynamically Generated Queries in Database Applications
Many data-intensive applications dynamically construct queries in response to client requests and execute them. Java servlets, e.g., can create string representations of SQL queri...
Carl Gould, Zhendong Su, Premkumar T. Devanbu
TKDE
2010
160views more  TKDE 2010»
13 years 3 months ago
Using Proximity Search to Estimate Authority Flow
—Authority flow and proximity search have been used extensively in measuring the association between entities in data graphs, ranging from the Web to relational and XML database...
Vagelis Hristidis, Yannis Papakonstantinou, Ramakr...
ICPPW
2003
IEEE
13 years 10 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
VLDB
2005
ACM
185views Database» more  VLDB 2005»
14 years 5 months ago
Storing and querying XML data using denormalized relational databases
XML database systems emerge as a result of the acceptance of the XML data model. Recent works have followed the promising approach of building XML database management systems on un...
Andrey Balmin, Yannis Papakonstantinou