Sciweavers

266 search results - page 27 / 54
» On first-order topological queries
Sort
View
GI
2004
Springer
14 years 28 days ago
Location-aware In-Network Monitoring in Wireless Sensor Networks
: This paper presents a data-centric and location-aware procedure to perform in-network evaluation of queries in sensor networks. The algorithm is a hybrid of geographic hash table...
Volker Turau, Christoph Weyer
WWW
2007
ACM
14 years 8 months ago
Analyzing web access control policies
XACML has emerged as a popular access control language on the Web, but because of its rich expressiveness, it has proved difficult to analyze in an automated fashion. In this pape...
Vladimir Kolovski, James A. Hendler, Bijan Parsia
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
14 years 1 months ago
Granularity Conscious Modeling for Probabilistic Databases
The convergence of embedded sensor systems and stream query processing suggests an important role for database techniques, in managing data that only partially – and often inacc...
Eirinaios Michelakis, Daisy Zhe Wang, Minos N. Gar...
ECAI
1992
Springer
13 years 11 months ago
A Strategy for the Computation of Conditional Answers
We consider non-Horn Deductive Data Bases (DDB) represented in a First Order language without function symbols. In this context the DDB is an incomplete description of the world. ...
Robert Demolombe
EJC
2008
13 years 7 months ago
Grad and classes with bounded expansion II. Algorithmic aspects
Abstract. Classes of graphs with bounded expansion are a generalization of both proper minor closed classes and degree bounded classes. Such classes are based on a new invariant, t...
Jaroslav Nesetril, Patrice Ossona de Mendez