Sciweavers

6650 search results - page 236 / 1330
» Mutating database queries
Sort
View
SDMW
2005
Springer
15 years 10 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
DATESO
2009
121views Database» more  DATESO 2009»
15 years 2 months ago
Translation of Ontology Retrieval Problem into Relational Queries
Ontology as a knowledge base can provide different reasoning tasks, e.g. to check consistency of the ontology or to check whether a resource is instance of a concept or not. In thi...
Jaroslav Pokorný, Jana Pribolová, Pe...
ADBIS
2009
Springer
210views Database» more  ADBIS 2009»
15 years 9 months ago
Performance Driven Database Design for Scalable Web Applications
Scaling up web applications requires distribution of load across multiple application servers and across multiple database servers. Distributing load across multiple application se...
Jozsef Patvarczki, Murali Mani, Neil T. Heffernan
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
16 years 4 months ago
FlexPref: A Framework for Extensible Preference Evaluation in Database Systems
Personalized database systems give users answers tailored to their personal preferences. While numerous preference evaluation methods for databases have been proposed (e.g., skylin...
Justin J. Levandoski, Mohamed F. Mokbel, Mohamed E...
PODS
1995
ACM
139views Database» more  PODS 1995»
15 years 8 months ago
Normalizing Incomplete Databases
Databases are often incomplete because of the presence of disjunctive information, due to con icts, partial knowledge and other reasons. Queries against such databases often ask q...
Leonid Libkin