Sciweavers

1497 search results - page 109 / 300
» Constraint Databases: A Survey
Sort
View
SACMAT
2003
ACM
15 years 3 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
CP
2007
Springer
15 years 4 months ago
A Compression Algorithm for Large Arity Extensional Constraints
We present an algorithm for compressing table constraints representing allowed or disallowed tuples. This type of constraint is used for example in configuration problems, where t...
George Katsirelos, Toby Walsh
VLDB
2004
ACM
139views Database» more  VLDB 2004»
15 years 10 months ago
Amit - the situation manager
: This paper presents the "situation manager", a tool that includes both a language and an efficient run-time execution mechanism, aimed at reducing the complexity of act...
Asaf Adi, Opher Etzion
SIGMOD
2008
ACM
131views Database» more  SIGMOD 2008»
15 years 10 months ago
Domain adaptation of information extraction models
Domain adaptation refers to the process of adapting an extraction model trained in one domain to another related domain with only unlabeled data. We present a brief survey of exis...
Rahul Gupta, Sunita Sarawagi
SIGMOD
2005
ACM
136views Database» more  SIGMOD 2005»
15 years 10 months ago
Peer-to-peer management of XML data: issues and research challenges
Peer-to-peer (p2p) systems are attracting increasing attention as an efficient means of sharing data among large, diverse and dynamic sets of users. The widespread use of XML as a...
Georgia Koloniari, Evaggelia Pitoura