Sciweavers

1497 search results - page 90 / 300
» Constraint Databases: A Survey
Sort
View
PODS
2006
ACM
138views Database» more  PODS 2006»
15 years 10 months ago
Efficiently ordering subgoals with access constraints
d Abstract] Guizhen Yang Artificial Intelligence Center SRI International Menlo Park, CA 94025, USA Michael Kifer Dept. of Computer Science Stony Brook University Stony Brook, NY 1...
Guizhen Yang, Michael Kifer, Vinay K. Chaudhri
SIGMOD
1999
ACM
132views Database» more  SIGMOD 1999»
15 years 2 months ago
Mind Your Vocabulary: Query Mapping Across Heterogeneous Information Sources
In this paper we present a mechanism for translating constraint queries, i.e., Boolean expressions of constraints, across heterogeneous information sources. Integrating such syste...
Kevin Chen-Chuan Chang, Hector Garcia-Molina
EDBTW
2006
Springer
14 years 11 months ago
Efficient Integrity Checking over XML Documents
The need for incremental constraint maintenance within collections of semi-structured documents has been ever increasing in the last years due to the widespread diffusion of XML. T...
Daniele Braga, Alessandro Campi, Davide Martinengh...
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
15 years 11 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
PODS
2009
ACM
113views Database» more  PODS 2009»
15 years 10 months ago
Relative information completeness
The paper investigates the question of whether a partially closed database has complete information to answer a query. In practice an enterprise often maintains master data Dm, a ...
Wenfei Fan, Floris Geerts