This paper studies five strategies for storing XML documents including one that leaves documents in the file system, three that use a relational database system, and one that uses...
Feng Tian, David J. DeWitt, Jianjun Chen, Chun Zha...
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
This paper is concerned with a transformation-based approach to update propagation in an extended version of Codd’s relational algebra which allows for defining derived relatio...
Portals are one of the rapidly growing applications on the Web, providing a single interface to access different sources (providers). Providing fast response time is one of the c...
Mehregan Mahdavi, John Shepherd, Boualem Benatalla...
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...