Sciweavers

298 search results - page 33 / 60
» Query Rewriting in DL-Lite_^(HN)_horn
Sort
View
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
15 years 11 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
16 years 12 days ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
EWDW
1994
15 years 3 months ago
Optimization of Object-Oriented Queries by Inverse Methods
For object-oriented databases we propose a new technique for optimizing queries containing method invocations. This technique is based on the definition of inverse methods and que...
Johann Eder, Heinz Frank, Walter Liebhart
VLDB
1993
ACM
99views Database» more  VLDB 1993»
15 years 3 months ago
Control of an Extensible Query Optimizer: A Planning-Based Approach
III this paper we address the problem of controlling the execution of a query optimizer. We describe a control for the optimization process that is based on planning. The controll...
Gail Mitchell, Umeshwar Dayal, Stanley B. Zdonik
92
Voted
NAACL
2010
14 years 9 months ago
Learning Dense Models of Query Similarity from User Click Logs
The goal of this work is to integrate query similarity metrics as features into a dense model that can be trained on large amounts of query log data, in order to rank query rewrit...
Fabio De Bona, Stefan Riezler, Keith Hall, Massimi...