Sciweavers

486 search results - page 19 / 98
» What was the Query
Sort
View
ESORICS
2002
Springer
16 years 5 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 2 months ago
Property Testing via Set-Theoretic Operations
: Given two testable properties P1 and P2, under what conditions are the union, intersection or set-difference of these two properties also testable? We initiate a systematic study...
Victor Chen, Madhu Sudan, Ning Xie
ISTA
2003
15 years 6 months ago
Querying Tourism Information Systems in Natural Language
: With the increasing amount of information available on the Internet one of the most challenging tasks is to provide search interfaces that are easy to use without having to learn...
Helmut Berger, Michael Dittenbach, Dieter Merkl
SIGMOD
2003
ACM
175views Database» more  SIGMOD 2003»
16 years 5 months ago
WinMagic : Subquery Elimination Using Window Aggregation
Database queries often take the form of correlated SQL queries. Correlation refers to the use of values from the outer query block to compute the inner subquery. This is a conveni...
Calisto Zuzarte, Hamid Pirahesh, Wenbin Ma, Qi Che...
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 11 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin