Sciweavers

2036 search results - page 357 / 408
» Using and Abusing XML
Sort
View
PODS
2008
ACM
143views Database» more  PODS 2008»
16 years 1 months ago
XPath, transitive closure logic, and nested tree walking automata
We consider the navigational core of XPath, extended with two operators: the Kleene star for taking the transitive closure of path expressions, and a subtree relativisation operat...
Balder ten Cate, Luc Segoufin
EDBT
2004
ACM
172views Database» more  EDBT 2004»
16 years 1 months ago
Efficient Similarity Search for Hierarchical Data in Large Databases
Structured and semi-structured object representations are getting more and more important for modern database applications. Examples for such data are hierarchical structures inclu...
Karin Kailing, Hans-Peter Kriegel, Stefan Schö...
PERCOM
2005
ACM
16 years 1 months ago
PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems
In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These devices must be able to discover and share ser...
Andrés Marín López, Carlos Ga...
IDTRUST
2010
ACM
15 years 8 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
BIRTHDAY
2009
Springer
15 years 8 months ago
Clio: Schema Mapping Creation and Data Exchange
Abstract. The Clio project provides tools that vastly simplify information integration. Information integration requires data conversions to bring data in different representation...
Ronald Fagin, Laura M. Haas, Mauricio A. Hern&aacu...