Sciweavers

2067 search results - page 299 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
ADBIS
2007
Springer
125views Database» more  ADBIS 2007»
15 years 10 months ago
Towards Self-Optimization of Message Transformation Processes
The Message Transformation Model (MTM), for modeling complex message transformation processes in data centric application scenarios, provides strong capabilities for describing the...
Matthias Böhm, Dirk Habich, Uwe Wloka, Jü...
GIS
2006
ACM
16 years 5 months ago
Analyzing theme, space, and time: an ontology-based approach
The W3C's Semantic Web Activity is illustrating the use of semantics for information integration, search, and analysis. However, the majority of the work in this community ha...
Matthew Perry, Farshad Hakimpour, Amit P. Sheth
WWW
2011
ACM
14 years 11 months ago
OXPath: little language, little memory, great value
Data about everything is readily available on the web—but often only accessible through elaborate user interactions. For automated decision support, extracting that data is esse...
Andrew Jon Sellers, Tim Furche, Georg Gottlob, Gio...
SSDBM
2010
IEEE
105views Database» more  SSDBM 2010»
15 years 9 months ago
Organization of Data in Non-convex Spatial Domains
We present a technique for organizing data in spatial databases with non-convex domains based on an automatic characterization using the medial-axis transform (MAT). We define a t...
Eric A. Perlman, Randal C. Burns, Michael M. Kazhd...
ICICS
2007
Springer
15 years 8 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia