Sciweavers

137 search results - page 15 / 28
» Characterizing schema mappings via data examples
Sort
View
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
BTW
2009
Springer
138views Database» more  BTW 2009»
14 years 2 months ago
GEM: A Generic Visualization and Editing Facility for Heterogeneous Metadata
: Many model management tasks, e.g., schema matching or merging, require the manual handling of metadata. Given the diversity of metadata, its many different representations and mo...
Jürgen Göres, Thomas Jörg, Boris St...
ICLP
1999
Springer
13 years 12 months ago
Bounded Nondeterminism of Logic Programs
We introduce the notion of bounded nondeterminism for logic programs and queries. A program and a query have bounded nondeterminism if there are finitely many refutations for the...
Dino Pedreschi, Salvatore Ruggieri
ESWS
2007
Springer
14 years 1 months ago
Understanding Large Volumes of Interconnected Individuals by Visual Exploration
Abstract. Ontologies are now used within an increasing number of realworld applications. So far, significant effort has been spend in building tools to support users in creating,...
Olaf Noppens, Thorsten Liebig
CAISE
1999
Springer
13 years 12 months ago
A Practical Approach to Access Heterogeneous and Distributed Databases
A common problem within most large corporations nowadays is the diversity of database systems that are employed by their many departments in the development of a product. Usually, ...
Fernando de Ferreira Rezende, Ulrich Hermsen, Geor...