Sciweavers

1363 search results - page 269 / 273
» On some Relations between Dynamical Systems and Transition S...
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 8 months ago
Reasoning About Approximate Match Query Results
Join techniques deploying approximate match predicates are fundamental data cleaning operations. A variety of predicates have been utilized to quantify approximate match in such o...
Sudipto Guha, Nick Koudas, Divesh Srivastava, Xiao...
ICDT
2009
ACM
175views Database» more  ICDT 2009»
14 years 8 months ago
Structural characterizations of schema-mapping languages
Schema mappings are declarative specifications that describe the relationship between two database schemas. In recent years, there has been an extensive study of schema mappings a...
Balder ten Cate, Phokion G. Kolaitis
PODS
2009
ACM
86views Database» more  PODS 2009»
14 years 8 months ago
Reverse data exchange: coping with nulls
An inverse of a schema mapping M is intended to "undo" what M does, thus providing a way to perform "reverse" data exchange. In recent years, three different f...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
HICSS
2003
IEEE
106views Biometrics» more  HICSS 2003»
14 years 20 days ago
Is web-based seminar an effective way of learning in adult education?
The Internet can be used to solve pedagogical problems. To give an example, seminars for crowded courses exceeding a hundred participants would not be possible without web-based a...
Pekka Makkonen