Sciweavers

889 search results - page 28 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
15 years 11 months ago
Convoy Queries in Spatio-Temporal Databases
We introduce a convoy query that retrieves all convoys from historical trajectories, each of which consists of a set of objects that travelled closely during a certain time period....
Hoyoung Jeung, Heng Tao Shen, Xiaofang Zhou
IIWAS
2007
14 years 11 months ago
An Extensible Framework for Database Security Assessment and Visualization
By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
Tran Khanh Dang, Thieu Hoa Le, Duy Tin Truong
DBPL
2009
Springer
131views Database» more  DBPL 2009»
15 years 4 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...
ADBIS
2000
Springer
91views Database» more  ADBIS 2000»
15 years 1 months ago
Efficient Region Query Processing by Optimal Page Ordering
A number of algorithms of clustering spatial data for reducing the number of disk seeks required to process spatial queries have been developed. One of the algorithms is the scheme...
Daesoo Cho, Bonghee Hong
ICDE
1991
IEEE
175views Database» more  ICDE 1991»
15 years 1 months ago
Constraint-Based Reasoning in Deductive Databases
— Constraints play an important role in the efficient query evaluation in deductive databases. In this paper, constraint-based query evaluation in deductive databases is investi...
Jiawei Han