Sciweavers

2516 search results - page 136 / 504
» Integrity Constraints for XML
Sort
View
AICOM
2004
100views more  AICOM 2004»
14 years 10 months ago
Query rewriting with symmetric constraints
Abstract. We address the problem of answering queries using expressive symmetric inter-schema constraints which allow to establish mappings between several heterogeneous informatio...
Christoph Koch
IJCAI
2001
14 years 11 months ago
Refining the Basic Constraint Propagation Algorithm
Constraint propagation is the main feature of any constraint solver. This is thus of prime importance to manage constraint propagation as efficiently as possible, justifying the us...
Christian Bessière, Jean-Charles Rég...
IADIS
2003
14 years 11 months ago
Pandora Case Tool: Triggers Generating for Cardinality Constraints in RDBMS
The cardinality constraint is one of the most important constraints that can be established in a conceptual model. Nevertheless, not all CASE tools for developing database support...
Harith T. Al-Jumaily, Dolores Cuadra, Paloma Mart&...
ICTAI
2005
IEEE
15 years 3 months ago
Improving Lotos Simulation Using Constraint Propagation
Lotos is the ISO formal specification language for describing and verifying concurrent and distributed systems. The simulation or execution of complex Lotos specifications is, h...
Malek Mouhoub, Samira Sadaoui
IEEEARES
2006
IEEE
15 years 4 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon