Sciweavers

1497 search results - page 264 / 300
» Constraint Databases: A Survey
Sort
View
ICSM
2002
IEEE
14 years 9 days ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
DEXA
2009
Springer
141views Database» more  DEXA 2009»
14 years 7 hour ago
Peer-to-Peer Semantic Wikis
Abstract. Wikis have demonstrated how it is possible to convert a community of strangers into a community of collaborators. Semantic wikis have opened an interesting way to mix web...
Hala Skaf-Molli, Charbel Rahhal, Pascal Molli
EDBT
2009
ACM
85views Database» more  EDBT 2009»
14 years 6 hour ago
Expressive, yet tractable XML keys
Constraints are important for a variety of XML recommendations and applications. Consequently, there are numerous opportunities for advancing the treatment of XML semantics. In pa...
Sven Hartmann, Sebastian Link
EDBT
2009
ACM
160views Database» more  EDBT 2009»
14 years 6 hour ago
Estimating aggregates in time-constrained approximate queries in Oracle
The concept of time-constrained SQL queries was introduced to address the problem of long-running SQL queries. A key approach adopted for supporting time-constrained SQL queries i...
Ying Hu, Seema Sundara, Jagannathan Srinivasan
EDBT
2009
ACM
90views Database» more  EDBT 2009»
14 years 6 hour ago
Parallelization of XPath queries using multi-core processors: challenges and experiences
In this study, we present experiences of parallelizing XPath queries using the Xalan XPath engine on shared-address space multi-core systems. For our evaluation, we consider a sce...
Rajesh Bordawekar, Lipyeow Lim, Oded Shmueli