Sciweavers

163 search results - page 30 / 33
» Integrating XML into a database systems course
Sort
View
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
PVLDB
2010
122views more  PVLDB 2010»
13 years 6 months ago
Avalanche-Safe LINQ Compilation
We report on a query compilation technique that enables the construction of alternative efficient query providers for Microsoft’s Language Integrated Query (LINQ) framework. LIN...
Torsten Grust, Jan Rittinger, Tom Schreiber
SIGMOD
2008
ACM
98views Database» more  SIGMOD 2008»
14 years 7 months ago
Damia: data mashups for intranet applications
Increasingly large numbers of situational applications are being created by enterprise business users as a by-product of solving day-to-day problems. In efforts to address the dem...
David E. Simmen, Mehmet Altinel, Volker Markl, Sri...
SACMAT
2006
ACM
14 years 1 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
JIDM
2010
160views more  JIDM 2010»
13 years 6 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo