Sciweavers

1611 search results - page 186 / 323
» Supporting Exploratory Queries in Databases
Sort
View
DEXA
2007
Springer
96views Database» more  DEXA 2007»
15 years 10 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
SIGMOD
1999
ACM
101views Database» more  SIGMOD 1999»
15 years 8 months ago
Computing Capabilities of Mediators
Existing data-integration systems based on the mediation architecture employ a variety of mechanisms to describe the query-processing capabilities ofsources. However, these system...
Ramana Yerneni, Chen Li, Hector Garcia-Molina, Jef...
CIDR
2007
111views Algorithms» more  CIDR 2007»
15 years 5 months ago
Moirae: History-Enhanced Monitoring
In this paper, we investigate the benefits and challenges of integrating history into a near-real-time monitoring system; and present a general purpose continuous monitoring engi...
Magdalena Balazinska, YongChul Kwon, Nathan Kuchta...
203
Voted
SIGMOD
2008
ACM
102views Database» more  SIGMOD 2008»
16 years 4 months ago
Stream firewalling of xml constraints
As XML-based messages have become common in many client-server protocols, there is a need to protect application servers from invalid or dangerous messages. This leads to the XML ...
Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild
ISSA
2004
15 years 5 months ago
On Privacy And The Web
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
Wesley Brandi