Sciweavers

4397 search results - page 49 / 880
» Relational Algebra Operations
Sort
View
97
Voted
CORR
2010
Springer
102views Education» more  CORR 2010»
15 years 21 days ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
IS
2007
15 years 15 days ago
Semantic optimization techniques for preference queries
Preference queries are relational algebra or SQL queries that contain occurrences of the winnow operator (find the most preferred tuples in a given relation). Such queries are pa...
Jan Chomicki
77
Voted
DLOG
2008
15 years 2 months ago
Locality and Subsumption Testing in EL and Some of its Extensions
Abstract. We show that subsumption problems in EL and related description logics can be expressed as uniform word problems in classes of semilattices with monotone operators. We us...
Viorica Sofronie-Stokkermans
93
Voted
AML
2006
83views more  AML 2006»
15 years 20 days ago
The Medvedev lattice of computably closed sets
Simpson introduced the lattice P of 0 1 classes under Medvedev reducibility. Questions regarding completeness in P are related to questions about measure and randomness. We presen...
Sebastiaan Terwijn
110
Voted
EDBTW
2006
Springer
15 years 2 months ago
The Importance of Algebra for XML Query Processing
Abstract. Relational algebra has been a crucial foundation for relational database systems, and has played a large role in enabling their success. A corresponding XML algebra for X...
Stelios Paparizos, H. V. Jagadish