Sciweavers

1830 search results - page 146 / 366
» Implementing a Tamper-Evident Database System
Sort
View
NDSS
2009
IEEE
14 years 5 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
PODS
1994
ACM
131views Database» more  PODS 1994»
14 years 2 months ago
Constraint Checking with Partial Information
Abstract Appears in Proceedings of the Thirteenth Symposium on Principles of Database Systems, 1994 Ashish Gupta Yehoshua Sagivy Je rey D. Ullman Jennifer Widom Dept. of Computer S...
Ashish Gupta, Yehoshua Sagiv, Jeffrey D. Ullman, J...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 2 months ago
Interactive query refinement
We investigate the problem of refining SQL queries to satisfy cardinality constraints on the query result. This has applications to the many/few answers problems often faced by da...
Chaitanya Mishra, Nick Koudas
FQAS
2006
Springer
136views Database» more  FQAS 2006»
14 years 2 months ago
Robust Query Processing for Personalized Information Access on the Semantic Web
Abstract. Research in Cooperative Query answering is triggered by the observation that users are often not able to correctly formulate queries to databases that return the intended...
Peter Dolog, Heiner Stuckenschmidt, Holger Wache
ISSA
2004
13 years 11 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford