Sciweavers

1445 search results - page 200 / 289
» XPath query containment
Sort
View
JAPLL
2010
133views more  JAPLL 2010»
15 years 2 months ago
Complexity of modal logics with Presburger constraints
We introduce the extended modal logic EML with regularity constraints and full Presburger constraints on the number of children that generalize graded modalities, also known as nu...
Stéphane Demri, Denis Lugiez
GLOBECOM
2010
IEEE
15 years 1 months ago
PRO: A Profile-Based Routing Protocol for Pocket Switched Networks
In this paper, we propose a novel routing protocol, PRO, for profile-based routing in pocket switched networks. Differing from previous routing protocols, PRO treats node encounter...
Murat Ali Bayir, Murat Demirbas
160
Voted
FAST
2009
15 years 1 months ago
On Explicit Provenance Management in RDF/S Graphs
The notion of RDF Named Graphs has been proposed in order to assign provenance information to data described using RDF triples. In this paper, we argue that named graphs alone can...
Panagiotis Pediaditis, Giorgos Flouris, Irini Fund...
JCIT
2010
174views more  JCIT 2010»
14 years 10 months ago
Efficient Ming of Top-K Closed Sequences
Sequence mining is an important data mining task. In order to retrieve interesting sequences from a large database, a minimum support threshold is needed to be specified. Unfortun...
Panida Songram
PVLDB
2010
128views more  PVLDB 2010»
14 years 10 months ago
Searching Workflows with Hierarchical Views
Workflows are prevalent in diverse applications, which can be scientific experiments, business processes, web services, or recipes. With the dramatically growing number of workflo...
Ziyang Liu, Qihong Shao, Yi Chen