Sciweavers

1004 search results - page 17 / 201
» Safe Constraint Queries
Sort
View
111
Voted
KDD
2002
ACM
150views Data Mining» more  KDD 2002»
16 years 25 days ago
Querying multiple sets of discovered rules
Rule mining is an important data mining task that has been applied to numerous real-world applications. Often a rule mining system generates a large number of rules and only a sma...
Alexander Tuzhilin, Bing Liu
187
Voted
POPL
2007
ACM
16 years 22 days ago
Semantics of static pointcuts in aspectJ
In aspect-oriented programming, one can intercept events by writing patterns called pointcuts. The pointcut language of the most popular aspect-oriented programming language, Aspe...
Pavel Avgustinov, Elnar Hajiyev, Neil Ongkingco, O...
137
Voted
LCC
1994
213views Algorithms» more  LCC 1994»
15 years 4 months ago
Linear Constraint Query Languages: Expressive Power and Complexity
We give an AC0 upper bound on the complexity of rst-oder queries over (in nite) databases de ned by restricted linear constraints. This result enables us to deduce the non-expressi...
Stéphane Grumbach, Jianwen Su, Christophe T...
112
Voted
GLOBE
2008
Springer
15 years 1 months ago
Query Propagation in a P2P Data Integration System in the Presence of Schema Constraints
This paper addresses the problem of data integration in a P2P environment, where each peer stores schema of its local data, mappings between the schemas, and some schema constraint...
Tadeusz Pankowski
94
Voted
EDBTW
2004
Springer
15 years 5 months ago
Query Answering in Peer-to-Peer Data Exchange Systems
The problem of answering queries posed to a peer who is a member of a peer-to-peerdataexchangesystemisstudied.Theanswershavetobeconsistentwrt to both the local semantic constraints...
Leopoldo E. Bertossi, Loreto Bravo