Sciweavers

2028 search results - page 28 / 406
» Deriving Relation Keys from XML Keys
Sort
View
ICDT
2009
ACM
198views Database» more  ICDT 2009»
16 years 4 months ago
Consistent query answering under primary keys: a characterization of tractable queries
This article deals with consistent query answering to conjunctive queries under primary key constraints. The repairs of an inconsistent database db are obtained by selecting a max...
Jef Wijsen
128
Voted
WWW
2005
ACM
16 years 4 months ago
Web data cleansing for information retrieval using key resource page selection
With the page explosion of WWW, how to cover more useful information with limited storage and computation resources becomes more and more important in web IR research. Using web p...
Yiqun Liu, Canhui Wang, Min Zhang, Shaoping Ma
120
Voted
ICCSA
2004
Springer
15 years 9 months ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
133
Voted
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
15 years 7 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
116
Voted
CIKM
2006
Springer
15 years 7 months ago
Annotation propagation revisited for key preserving views
This paper revisits the analysis of annotation propagation from source databases to views defined in terms of conjunctive (SPJ) queries. Given a source database D, an SPJ query Q,...
Gao Cong, Wenfei Fan, Floris Geerts