Sciweavers

698 search results - page 71 / 140
» Auditing SQL Queries
Sort
View
SIGMOD
2007
ACM
225views Database» more  SIGMOD 2007»
15 years 10 months ago
From complete to incomplete information and back
Incomplete information arises naturally in numerous data management applications. Recently, several researchers have studied query processing in the context of incomplete informat...
Lyublena Antova, Christoph Koch, Dan Olteanu
PODS
2005
ACM
136views Database» more  PODS 2005»
15 years 10 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
SSD
2009
Springer
193views Database» more  SSD 2009»
15 years 4 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
OTM
2005
Springer
15 years 3 months ago
Don't Mind Your Vocabulary: Data Sharing Across Heterogeneous Peers
The strong dynamics of peer-to-peer networks, coupled with the diversity of peer vocabularies, makes query processing in peer database systems a very challenging task. In this pape...
Mehedi Masud, Iluju Kiringa, Anastasios Kementsiet...
INEX
2004
Springer
15 years 3 months ago
DocBase - The INEX Evaluation Experience
Abstract. Can a system designed primarily for the purpose of databasetype storage and retrieval be used for information-retrieval tasks? This was one of the questions that led us t...
Sriram Mohan, Arijit Sengupta