Sciweavers

1459 search results - page 9 / 292
» An authorization model for temporal data
Sort
View
EDBT
2006
ACM
177views Database» more  EDBT 2006»
15 years 11 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
ICDM
2003
IEEE
118views Data Mining» more  ICDM 2003»
15 years 4 months ago
Links Between Kleinberg's Hubs and Authorities, Correspondence Analysis, and Markov Chains
In this work, we show that Kleinberg’s hubs and authorities model is closely related to both correspondence analysis, a well-known multivariate statistical technique, and a parti...
François Fouss, Marco Saerens, Jean-Michel ...
ICSE
2003
IEEE-ACM
15 years 4 months ago
Data Flow Testing as Model Checking
This paper presents a model checking-based approach to data flow testing. We characterize data flow oriented coverage criteria in temporal logic such that the problem of test ge...
Hyoung Seok Hong, Sung Deok Cha, Insup Lee, Oleg S...
VLDB
1992
ACM
151views Database» more  VLDB 1992»
15 years 3 months ago
A Uniform Approach to Processing Temporal Queries
Research in temporal databases has mainly focused on defining temporal data models by extending existing models, and developing access structures for temporal data. Little has bee...
Umeshwar Dayal, Gene T. J. Wuu
ISI
2006
Springer
14 years 11 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...