Sciweavers

1860 search results - page 121 / 372
» A Model of Queries for Object-Oriented Databases
Sort
View
EDBT
2006
ACM
177views Database» more  EDBT 2006»
16 years 5 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
136
Voted
VLDB
1991
ACM
111views Database» more  VLDB 1991»
15 years 8 months ago
The Power of Methods With Parallel Semantics
A model capturing the data manipulation capabilities of a large class of methods in ohjectoriented databases is proposed and investsigated. The model uses a deterministic, paralle...
Karl Denninghoff, Victor Vianu
137
Voted
CIKM
2000
Springer
15 years 9 months ago
The Webspace Method: On the Integration of Database Technology with Multimedia Retrieval
Large collections of documents containing various types of multimedia, are made available to the WWW. Unfortunately, due to the un-structuredness of Internet environments it is ha...
Roelof van Zwol, Peter M. G. Apers
PODS
2007
ACM
131views Database» more  PODS 2007»
16 years 5 months ago
Provenance semirings
We show that relational algebra calculations for incomplete databases, probabilistic databases, bag semantics and whyprovenance are particular cases of the same general algorithms...
Todd J. Green, Gregory Karvounarakis, Val Tannen
ICDT
2001
ACM
124views Database» more  ICDT 2001»
15 years 9 months ago
Why and Where: A Characterization of Data Provenance
Withthe proliferation of database views and curated databases, the issue of data provenance where a piece of data came from and the process by which it arrived in the database is b...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan