Sciweavers

413 search results - page 42 / 83
» Optimizing Queries Across Diverse Data Sources
Sort
View
JIIS
2002
118views more  JIIS 2002»
14 years 9 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...
SAMT
2007
Springer
109views Multimedia» more  SAMT 2007»
15 years 3 months ago
Challenges in Supporting Faceted Semantic Browsing of Multimedia Collections
This paper describes our experience developing a semantically-rich exploratory interface that integrates a suite of Newsfilm media sources and associated information. Indeed, the a...
Daniel A. Smith, Alisdair Owens, m. c. schraefel, ...
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
15 years 3 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
ICDE
2009
IEEE
176views Database» more  ICDE 2009»
15 years 11 months ago
Efficient Table Anonymization for Aggregate Query Answering
Abstract-- Privacy protection is a major concern when microdata needs to be released for ad hoc analyses. This has led to a lot of recent research in privacy goals and table anonym...
Cecilia M. Procopiuc, Divesh Srivastava
ER
2008
Springer
110views Database» more  ER 2008»
14 years 11 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi