When the available information is imperfect, it is often desirable to represent it in the database, so that it can be used to answer queries of interest as much as possible. The da...
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
In the last few years, XML became a de-facto standard for the exchange of structured and semi-structured data. The database research community took this development into account b...
Abstract With the rapid advances in mobile computing technology, there is an increasing demand for processing realtime transactions in a mobile environment. This paper studies con...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
Resource allocation in database management systems is a performance management process in which an autonomic DBMS makes resource allocation decisions based on properties like work...
Mingyi Zhang, Patrick Martin, Wendy Powley, Paul B...