Sciweavers

1011 search results - page 21 / 203
» Numerical Constraints for XML
Sort
View
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
14 years 11 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
DATESO
2007
103views Database» more  DATESO 2007»
13 years 11 months ago
Using BMH Algorithm to Solve Subset of XPath Queries
Boyer-Moore-Horspool (BMH) algorithm is commonly used to solve text searching problems. In this paper is used to solve the constraint subset of XPath queries offering effective alg...
David Toth
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 11 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
CAD
1999
Springer
13 years 9 months ago
Geometric constraint satisfaction using optimization methods
The numerical approach to solving geometric constraint problems is indispensable for building a practical CAD system. The most commonly-used numerical method is the Newton
Jian-Xin Ge, Shang-Ching Chou, Xiao-Shan Gao
EACL
2003
ACL Anthology
13 years 11 months ago
Development of Corpora within the CLaRK System: The BulTreeBank Project Experience
CLaRK is an XML-based software system for corpora development. It incorporates several technologies: XML technology; Unicode; Regular Cascaded Grammars; Constraints over XML Docum...
Kiril Ivanov Simov, Alexander Simov, Milen Kouylek...