Sciweavers

1937 search results - page 188 / 388
» Conditioning Probabilistic Databases
Sort
View
112
Voted
ICFEM
2009
Springer
15 years 9 months ago
Symbolic Query Exploration
Abstract. We study the problem of generating a database and parameters for a given parameterized SQL query satisfying a given test condition. We introduce a formal background theor...
Margus Veanes, Pavel Grigorenko, Peli de Halleux, ...
114
Voted
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
15 years 8 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay
124
Voted
DBISP2P
2005
Springer
91views Database» more  DBISP2P 2005»
15 years 8 months ago
A Semantic Information Retrieval Advertisement and Policy Based System for a P2P Network
Abstract. In this paper we propose a semantic based P2P system that incorporates peer sharing policies, which allow a peer to state, for each of the concepts it deals with, the con...
Giovanna Guerrini, Viviana Mascardi, Marco Mesiti
131
Voted
JIT
2005
Springer
130views Database» more  JIT 2005»
15 years 8 months ago
Policies for an AOP Based Auto-Adaptive Framework
Dynamic AOP has been identified as a useful technique to implement an auto-adaptive framework. To supplement this policies based upon EventCondition-Action rules are used to specif...
Phil Greenwood, Lynne Blair
107
Voted
PODS
2003
ACM
114views Database» more  PODS 2003»
16 years 2 months ago
An information-theoretic approach to normal forms for relational and XML data
Normalization as a way of producing good database designs is a well-understood topic. However, the same problem of distinguishing well-designed databases from poorly designed ones...
Marcelo Arenas, Leonid Libkin