Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
We consider the incremental validation of updates on XML documents. When a valid XML document (i.e., one satisfying some constraints) is updated, it has to be verified that the n...
: Update anywhere-anytime-anyway transactional replication has unstable behavior as the workload scales up: a ten-fold increase in nodes and traffic gives a thousand fold increase ...
Jim Gray, Pat Helland, Patrick E. O'Neil, Dennis S...
Large amounts of (often valuable) information are stored in web-accessible text databases. "Metasearchers" provide unified interfaces to query multiple such databases at...
Panagiotis G. Ipeirotis, Alexandros Ntoulas, Jungh...