Sciweavers

1779 search results - page 189 / 356
» A Formal Model of Data Privacy
Sort
View
154
Voted
PODS
2007
ACM
131views Database» more  PODS 2007»
16 years 4 months ago
Provenance semirings
We show that relational algebra calculations for incomplete databases, probabilistic databases, bag semantics and whyprovenance are particular cases of the same general algorithms...
Todd J. Green, Gregory Karvounarakis, Val Tannen
ER
2005
Springer
186views Database» more  ER 2005»
15 years 10 months ago
Blueprints and Measures for ETL Workflows
Extract-Transform-Load (ETL) workflows are data centric workflows responsible for transferring, cleaning, and loading data from their respective sources to the warehouse. Previous ...
Panos Vassiliadis, Alkis Simitsis, Manolis Terrovi...
ACSD
2001
IEEE
134views Hardware» more  ACSD 2001»
15 years 8 months ago
Embedding Imperative Synchronous Languages in Interactive Theorem Provers
We present a new way to define the semantics of imperative synchronous languages by means of separating the control and the data flow. The control flow is defined by predicates th...
Klaus Schneider
ACSAC
2002
IEEE
15 years 9 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
BPM
2007
Springer
125views Business» more  BPM 2007»
15 years 11 months ago
What Makes Process Models Understandable?
Abstract. Despite that formal and informal quality aspects are of significant importance to business process modeling, there is only little empirical work reported on process mode...
Jan Mendling, Hajo A. Reijers, Jorge Cardoso