Sciweavers

1000 search results - page 148 / 200
» Nominal rewriting systems
Sort
View
WETICE
1997
IEEE
14 years 28 days ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
SIGMOD
1997
ACM
159views Database» more  SIGMOD 1997»
14 years 27 days ago
On-Line Warehouse View Maintenance
Data warehouses store materialized views over base data from external sources. Clients typically perform complex read-only queries on the views. The views are refreshed periodical...
Dallan Quass, Jennifer Widom
EWDW
1994
14 years 24 days ago
Optimization of Object-Oriented Queries by Inverse Methods
For object-oriented databases we propose a new technique for optimizing queries containing method invocations. This technique is based on the definition of inverse methods and que...
Johann Eder, Heinz Frank, Walter Liebhart
VLDB
1994
ACM
128views Database» more  VLDB 1994»
14 years 24 days ago
From Nested-Loop to Join Queries in OODB
Most declarative SQL-like query languagesfor object-oriented database systems (OOSQL) are orthogonal languages allowing for arbitrary nesting of expressions in the select-, from-,...
Hennie J. Steenhagen, Peter M. G. Apers, Henk M. B...
FQAS
2006
Springer
136views Database» more  FQAS 2006»
14 years 11 days ago
Robust Query Processing for Personalized Information Access on the Semantic Web
Abstract. Research in Cooperative Query answering is triggered by the observation that users are often not able to correctly formulate queries to databases that return the intended...
Peter Dolog, Heiner Stuckenschmidt, Holger Wache