Sciweavers

1719 search results - page 167 / 344
» Magic Sets for Data Integration
Sort
View
SAC
2009
ACM
15 years 9 months ago
Discovering XML keys and foreign keys in queries
The XML has undoubtedly become a standard for data representation and manipulation. But most of XML documents are still created without the respective description of their structu...
Martin Necaský, Irena Mlýnková...
KDD
1998
ACM
105views Data Mining» more  KDD 1998»
15 years 8 months ago
PlanMine: Sequence Mining for Plan Failures
This paper presents the PLANMINE sequence mining algorithm to extract patterns of events that predict failures in databases of plan executions. New techniques were needed because ...
Mohammed Javeed Zaki, Neal Lesh, Mitsunori Ogihara
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 4 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
PVLDB
2010
151views more  PVLDB 2010»
15 years 2 months ago
Advanced Processing for Ontological Queries
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...
Andrea Calì, Georg Gottlob, Andreas Pieris
BTW
2007
Springer
236views Database» more  BTW 2007»
15 years 8 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann