Sciweavers

1933 search results - page 272 / 387
» Query Containment Using Views
Sort
View
BTW
2007
Springer
236views Database» more  BTW 2007»
15 years 7 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
BMCBI
2010
112views more  BMCBI 2010»
15 years 3 months ago
TabSQL: a MySQL tool to facilitate mapping user data to public databases
Background: With advances in high-throughput genomics and proteomics, it is challenging for biologists to deal with large data files and to map their data to annotations in public...
Xiaoqin Xia, Michael McClelland, Yipeng Wang
APPROX
2007
Springer
100views Algorithms» more  APPROX 2007»
15 years 9 months ago
Implementing Huge Sparse Random Graphs
Consider a scenario where one desires to simulate the execution of some graph algorithm on random input graphs of huge, perhaps even exponential size. Sampling and storing these h...
Moni Naor, Asaf Nussboim
CCS
2006
ACM
15 years 6 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
ASIACRYPT
2011
Springer
14 years 2 months ago
Functional Encryption for Inner Product Predicates from Learning with Errors
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This co...
Shweta Agrawal, David Mandell Freeman, Vinod Vaiku...