Sciweavers

5344 search results - page 151 / 1069
» Privacy-Preserving Set Operations
Sort
View
ESORICS
2007
Springer
15 years 7 months ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu
EUSFLAT
2007
133views Fuzzy Logic» more  EUSFLAT 2007»
15 years 4 months ago
Interior-Based Topology in Fuzzy Class Theory
Fuzzy topology based on interior operators is studied in the fully graded framework of Fuzzy Class Theory. Its relation to graded notions of fuzzy topology given by open sets and ...
Libor Behounek, Tomás Kroupa
201
Voted
VLDB
2007
ACM
130views Database» more  VLDB 2007»
16 years 3 months ago
Model Management and Schema Mappings: Theory and Practice
We present an overview of a tutorial on model management--an approach to solving data integration problems, such as data warehousing, e-commerce, object-to-relational mapping, sch...
Philip A. Bernstein, Howard Ho
AUSAI
2007
Springer
15 years 9 months ago
Characterising Deadlines in Temporal Modal Defeasible Logic
Abstract. We provide a conceptual analysis of several kinds of deadlines, represented in Temporal Modal Defeasible Logic. The paper presents a typology of deadlines, based on the f...
Guido Governatori, Joris Hulstijn, Régis Ri...
CP
2005
Springer
15 years 8 months ago
Encoding Requests to Web Service Compositions as Constraints
Interacting with a web service enabled marketplace in order to achieve a complex task involves sequencing a set of individual service operations, gathering information from the ser...
Alexander Lazovik, Marco Aiello, Rosella Gennari