Sciweavers

325 search results - page 23 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 4 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
AAAI
1993
13 years 9 months ago
A Method for Development of Dialogue Managers for Natural Language Interfaces
This paper describes a method for the development of dialogue managers for natural language interfaces. A dialogue manager is presented designed on the basis of both a theoretical...
Arne Jönsson
IDEAS
2003
IEEE
117views Database» more  IDEAS 2003»
14 years 28 days ago
A Multi-Resolution Block Storage Model for Database Design
We propose a new storage model called MBSM (Multiresolution Block Storage Model) for laying out tables on disks. MBSM is intended to speed up operations such as scans that are typ...
Jingren Zhou, Kenneth A. Ross
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
13 years 11 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
BTW
2003
Springer
94views Database» more  BTW 2003»
14 years 27 days ago
The Paradigm of Relational Indexing: a Survey
Abstract: In order to achieve efficient execution plans for queries comprising userdefined data types and predicates, the database system has to be provided with appropriate index ...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...