Sciweavers

AMW
2010
13 years 6 months ago
On Incomplete XML Documents with Integrity Constraints
We consider incomplete specifications of XML documents in the presence of schema information and integrity constraints. We show that integrity constraints such as keys and foreign ...
Pablo Barceló, Leonid Libkin, Juan L. Reutt...
AMW
2010
13 years 6 months ago
Query Rewriting under Non-Guarded Rules
We address the problem of answering conjunctive queries over knowledge bases, specified by sets of first-order sentences called tuple-generating dependencies (TGDs). This problem i...
Andrea Calì, Georg Gottlob, Andreas Pieris
AMW
2010
13 years 6 months ago
Multiresolution Cube Estimators for Sensor Network Aggregate Queries
In this work we present in-network techniques to improve the efficiency of spatial aggregate queries. Such queries are very common in a sensornet setting, demanding more targeted t...
Alexandra Meliou, Carlos Guestrin, Joseph M. Helle...
AMW
2010
13 years 6 months ago
Generating XML/GML Schemas from Geographic Conceptual Schemas
Abstract. A large volume of data with complex structures is currently represented in GML (Geography Markup Language) for storing and exchanging geographic information. As the size ...
André C. Hora, Clodoveu A. Davis Jr., Mirel...
AMW
2010
13 years 6 months ago
Cooperative Authorship Social Network
This paper introduces a set of challenges for developing a dissemination service over a Web collaborative network. We define specific metrics for working on a co-authorship researc...
Giseli Rabello Lopes, Mirella M. Moro, Leandro Kru...
AMW
2010
13 years 6 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
AMW
2010
13 years 6 months ago
Updating ABoxes in DL-Lite
Abstract. We study the problem of instance level (ABox) updates for Knowledge Bases (KBs) represented in Description Logics of the DL-Lite family. DLLite is at the basis of OWL 2 Q...
Diego Calvanese, Evgeny Kharlamov, Werner Nutt, Dm...
AMW
2010
13 years 6 months ago
Chasing after Secrets in Relational Databases
Abstract. Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it ...
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...