Sciweavers

188 search results - page 26 / 38
» A Formal Implementation of Value Commitment
Sort
View
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 9 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
14 years 8 months ago
Ontology-Based Constraint Recognition for Free-Form Service Requests
Automatic recognition and formalization of constraints from free-form service requests is a challenging problem. Its resolution would go a long way toward allowing users to make r...
Muhammed Al-Muhammed, David W. Embley
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
14 years 8 months ago
SUBSKY: Efficient Computation of Skylines in Subspaces
Given a set of multi-dimensional points, the skyline contains the best points according to any preference function that is monotone on all axes. In practice, applications that req...
Yufei Tao, Xiaokui Xiao, Jian Pei
ECOOP
2009
Springer
14 years 8 months ago
Checking Framework Interactions with Relationships
Software frameworks impose constraints on how plugins may interact with them. Many of hese constraints involve multiple objects, are temporal, and depend on runtime values. Additi...
Ciera Jaspan, Jonathan Aldrich
ICWS
2009
IEEE
14 years 4 months ago
A Policy-Based Middleware for Web Services SLA Negotiation
Negotiation of Service Level Agreements (SLAs) is very important for maintaining Quality of Service (QoS) of composite Web services-based business processes. The process of negoti...
Farhana H. Zulkernine, Patrick Martin, Chris Cradd...