Sciweavers

1830 search results - page 286 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
2003
ACM
140views Database» more  SIGMOD 2003»
16 years 25 days ago
A Comprehensive XQuery to SQL Translation using Dynamic Interval Encoding
The W3C XQuery language recommendation, based on a hierarchical and ordered document model, supports a wide variety of constructs and use cases. There is a diversity of approaches...
David DeHaan, David Toman, Mariano P. Consens, M. ...
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
16 years 25 days ago
Exchanging Intensional XML Data
XML is becoming the universal format for data exchange between applications. Recently, the emergence of Web services as standard means of publishing and accessing data on the Web ...
Tova Milo, Serge Abiteboul, Bernd Amann, Omar Benj...
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 24 days ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
PODS
2006
ACM
118views Database» more  PODS 2006»
16 years 24 days ago
Analyzing workflows implied by instance-dependent access rules
Recently proposed form-based web information systems liberate the capture and reuse of data in organizations by substituting the development of technical implementations of electr...
Toon Calders, Stijn Dekeyser, Jan Hidders, Jan Par...
92
Voted
CHI
2010
ACM
15 years 7 months ago
What would other programmers do: suggesting solutions to error messages
Interpreting compiler errors and exception messages is challenging for novice programmers. Presenting examples of how other programmers have corrected similar errors may help novi...
Björn Hartmann, Daniel MacDougall, Joel Brand...