Sciweavers

2067 search results - page 10 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
ISI
2006
Springer
14 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
SSDBM
2009
IEEE
77views Database» more  SSDBM 2009»
15 years 4 months ago
Query Recommendations for Interactive Database Exploration
Abstract. Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenar...
Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis P...
EDBT
1992
ACM
111views Database» more  EDBT 1992»
15 years 28 days ago
Pipelined Query Processing in the DBGraph Storage Model
The DBGraph storage model, designed for main memory DBMS, ensures both data storage compactness and efficient processing for all database operations. By representing the entire da...
Philippe Pucheral, Jean-Marc Thévenin
BMCBI
2010
183views more  BMCBI 2010»
14 years 9 months ago
SING: Subgraph search In Non-homogeneous Graphs
Background: Finding the subgraphs of a graph database that are isomorphic to a given query graph has practical applications in several fields, from cheminformatics to image unders...
Raffaele Di Natale, Alfredo Ferro, Rosalba Giugno,...
ICDE
2002
IEEE
163views Database» more  ICDE 2002»
15 years 10 months ago
Keyword Searching and Browsing in Databases using BANKS
With the growth of the Web, there has been a rapid increase in the number of users who need to access online databases without having a detailed knowledge of the schema or of quer...
Gaurav Bhalotia, Arvind Hulgeri, Charuta Nakhe, So...