Sciweavers

6434 search results - page 1153 / 1287
» Model Transformations with Reference Models
Sort
View
143
Voted
LPNMR
2004
Springer
15 years 8 months ago
Towards Automated Integration of Guess and Check Programs in Answer Set Programming
Abstract. Many NP-complete problems can be encoded in the answer set semantics of logic programs in a very concise way, where the encoding reflects the typical “guess and checkâ...
Thomas Eiter, Axel Polleres
129
Voted
OTM
2004
Springer
15 years 8 months ago
Revising and Managing Multiple Ontology Versions in a Possible Worlds Setting
Abstract. To date, ontology research seems to have come to an equilibrium: there is a wide variety of theories, methods and tools for extracting, representing, storing and browsing...
Pieter De Leenheer
POLICY
2004
Springer
15 years 8 months ago
A Goal-based Approach to Policy Refinement
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...
123
Voted
VLDB
2004
ACM
144views Database» more  VLDB 2004»
15 years 8 months ago
Returning Modified Rows - SELECT Statements with Side Effects
SQL in the IBM® DB2® Universal Database™ for Linux®, UNIX®, and Windows® (DB2 UDB) database management product has been extended to support nested INSERT, UPDATE, and DELET...
Andreas Behm, Serge Rielau, Richard Swagerman
109
Voted
VLDB
2004
ACM
134views Database» more  VLDB 2004»
15 years 8 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik
« Prev « First page 1153 / 1287 Last » Next »