Sciweavers

42388 search results - page 8236 / 8478
» Classification Using Information
Sort
View
137
Voted
PODS
2008
ACM
165views Database» more  PODS 2008»
16 years 3 months ago
Data exchange and schema mappings in open and closed worlds
In the study of data exchange one usually assumes an openworld semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only move...
Leonid Libkin, Cristina Sirangelo
134
Voted
PODS
2008
ACM
170views Database» more  PODS 2008»
16 years 3 months ago
Answering aggregate queries in data exchange
Data exchange, also known as data translation, has been extensively investigated in recent years. One main direction of research has focused on the semantics and the complexity of...
Foto N. Afrati, Phokion G. Kolaitis
131
Voted
PODS
2008
ACM
155views Database» more  PODS 2008»
16 years 3 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
169
Voted
PODS
2008
ACM
174views Database» more  PODS 2008»
16 years 3 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
133
Voted
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 3 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
« Prev « First page 8236 / 8478 Last » Next »