Sciweavers

12 search results - page 2 / 3
» Provenance query evaluation: what's so special about it
Sort
View
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
14 years 1 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
DAGSTUHL
1998
13 years 7 months ago
A Practical Approach to Hypothetical Database Queries
Hypothetical queries are queries embedding hypotheses about the database. The embedded hypothesis in a hypothetical query indicates, so to say, a state of the database intended for...
Henning Christiansen, Troels Andreasen
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
13 years 10 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 6 months ago
XPath Whole Query Optimization
Previous work reports about SXSI, a fast XPath engine which executes tree automata over compressed XML indexes. Here, reasons are investigated why SXSI is so fast. It is shown tha...
Sebastian Maneth, Kim Nguyen
WWW
2005
ACM
14 years 6 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham