Sciweavers

1937 search results - page 188 / 388
» Conditioning Probabilistic Databases
Sort
View
ICFEM
2009
Springer
15 years 5 months ago
Symbolic Query Exploration
Abstract. We study the problem of generating a database and parameters for a given parameterized SQL query satisfying a given test condition. We introduce a formal background theor...
Margus Veanes, Pavel Grigorenko, Peli de Halleux, ...
91
Voted
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
15 years 5 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay
93
Voted
DBISP2P
2005
Springer
91views Database» more  DBISP2P 2005»
15 years 4 months ago
A Semantic Information Retrieval Advertisement and Policy Based System for a P2P Network
Abstract. In this paper we propose a semantic based P2P system that incorporates peer sharing policies, which allow a peer to state, for each of the concepts it deals with, the con...
Giovanna Guerrini, Viviana Mascardi, Marco Mesiti
JIT
2005
Springer
130views Database» more  JIT 2005»
15 years 4 months ago
Policies for an AOP Based Auto-Adaptive Framework
Dynamic AOP has been identified as a useful technique to implement an auto-adaptive framework. To supplement this policies based upon EventCondition-Action rules are used to specif...
Phil Greenwood, Lynne Blair
PODS
2003
ACM
114views Database» more  PODS 2003»
15 years 11 months ago
An information-theoretic approach to normal forms for relational and XML data
Normalization as a way of producing good database designs is a well-understood topic. However, the same problem of distinguishing well-designed databases from poorly designed ones...
Marcelo Arenas, Leonid Libkin