Sciweavers

1121 search results - page 65 / 225
» Database Patchwork on the Internet
Sort
View
IADIS
2003
14 years 11 months ago
Pandora Case Tool: Triggers Generating for Cardinality Constraints in RDBMS
The cardinality constraint is one of the most important constraints that can be established in a conceptual model. Nevertheless, not all CASE tools for developing database support...
Harith T. Al-Jumaily, Dolores Cuadra, Paloma Mart&...
SIGMOD
2010
ACM
132views Database» more  SIGMOD 2010»
14 years 4 months ago
Durable top-k search in document archives
We propose and study a new ranking problem in versioned databases. Consider a database of versioned objects which have different valid instances along a history (e.g., documents i...
Leong Hou U, Nikos Mamoulis, Klaus Berberich, Srik...
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
15 years 10 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
DRM
2004
Springer
15 years 3 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
VLDB
2002
ACM
116views Database» more  VLDB 2002»
14 years 9 months ago
The Denodo Data Integration Platform
The world today is characterised by the proliferation of information sources available through media such as the WWW, databases, semi-structured files (e.g. XML documents), etc. N...
Alberto Pan, Juan Raposo, Manuel Álvarez, P...