Sciweavers

1497 search results - page 116 / 300
» Constraint Databases: A Survey
Sort
View
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
15 years 4 months ago
Security Conscious Web Service Composition with Semantic Web Support
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web ...
Barbara Carminati, Elena Ferrari, Ryan Bishop, Pat...
CINQ
2004
Springer
119views Database» more  CINQ 2004»
15 years 3 months ago
How to Quickly Find a Witness
The subfield of itemset mining is essentially a collection of algorithms. Whenever a new type of constraint is discovered, a specialized algorithm is proposed to handle it. All o...
Daniel Kifer, Johannes Gehrke, Cristian Bucila, Wa...
RULES
1995
Springer
120views Database» more  RULES 1995»
15 years 1 months ago
Temporized and Localized Rule Sets
Constraint management plays an important role in design applications where constraints re ect design restrictions and design decisions. ECA rules are a widely used mechanism to enf...
Rose Sturm, Jutta A. Mülle, Peter C. Lockeman...
CCGRID
2007
IEEE
15 years 1 months ago
STORM: An Approach to Database Storage Management in Clustered Storage Environments
Database storage management in clustered storage environments is a manual, time-consuming, and error-prone task. Such management involves regular movement of database objects acro...
Kaushik Dutta, Raju Rangaswami
CINQ
2004
Springer
157views Database» more  CINQ 2004»
15 years 1 months ago
Inductive Databases and Multiple Uses of Frequent Itemsets: The cInQ Approach
Inductive databases (IDBs) have been proposed to afford the problem of knowledge discovery from huge databases. With an IDB the user/analyst performs a set of very different operat...
Jean-François Boulicaut