Sciweavers

889 search results - page 71 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 3 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
PODS
2008
ACM
204views Database» more  PODS 2008»
15 years 9 months ago
Annotated XML: queries and provenance
We present a formal framework for capturing the provenance of data appearing in XQuery views of XML. Building on previous work on relations and their (positive) query languages, w...
J. Nathan Foster, Todd J. Green, Val Tannen
MOBIDE
2010
ACM
14 years 10 months ago
Power-aware operator placement and broadcasting of continuous query results
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...
ICIP
2003
IEEE
15 years 11 months ago
Multitemporal geospatial query grouping using correlation signatures
With recent advances in temporal and spatiotemporal databases, user demands are becoming more complex. As a result, simple queries are replaced by complex multitemporal query scen...
Giorgos Mountrakis, Peggy Agouris, Anthony Stefani...
BNCOD
1997
76views Database» more  BNCOD 1997»
14 years 11 months ago
Query Evaluation in CROQUE - Calculus and Algebra Coincide
With the substantial change of declarative query languages from plain SQL to the so-called \object SQLs", in particular OQL, there has surprisingly been not much change in the...
Torsten Grust, Joachim Kröger, Dieter Gluche,...