Sciweavers

120 search results - page 21 / 24
» From CTL to Datalog
Sort
View
ICDT
2007
ACM
105views Database» more  ICDT 2007»
15 years 3 months ago
Optimization of Query Plans in the presence of Access Limitations
We consider the problem of querying data sources that have limited capabilities and can thus only be accessed by complying with certain binding patterns for their attributes. This ...
Andrea Calì, Diego Calvanese, Davide Martin...
OTM
2007
Springer
15 years 3 months ago
SPARQL++ for Mapping Between RDF Vocabularies
Lightweight ontologies in the form of RDF vocabularies such as SIOC, FOAF, vCard, etc. are increasingly being used and exported by “serious” applications recently. Such vocabul...
Axel Polleres, François Scharffe, Roman Sch...
CSFW
2003
IEEE
15 years 2 months ago
Understanding SPKI/SDSI Using First-Order Logic
SPKI/SDSI is a language for expressing distributed access control policy, derived from SPKI and SDSI. We provide a first-order logic (FOL) semantics for SDSI, and show that it ha...
Ninghui Li, John C. Mitchell
ICDT
2001
ACM
110views Database» more  ICDT 2001»
15 years 2 months ago
On Answering Queries in the Presence of Limited Access Patterns
In information-integration systems, source relations often have limitations on access patterns to their data; i.e., when one must provide values for certain attributes of a relatio...
Chen Li, Edward Y. Chang
111
Voted
SP
2000
IEEE
15 years 2 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum