Sciweavers

2492 search results - page 73 / 499
» Ontology-based Database Access
Sort
View
ICDT
2005
ACM
130views Database» more  ICDT 2005»
14 years 3 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash
CIKM
2005
Springer
14 years 3 months ago
WAM-Miner: in the search of web access motifs from historical web log data
Existing web usage mining techniques focus only on discovering knowledge based on the statistical measures obtained from the static characteristics of web usage data. They do not ...
Qiankun Zhao, Sourav S. Bhowmick, Le Gruenwald
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
13 years 8 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
WEBNET
2000
13 years 11 months ago
Adapting the Web Development Environment for accessible and usable application construction
: Web application accessibility requires the enforcement of a set of rules on the content written or generated with the help of Web Development Environments. W3C Consortium's ...
Elena García Barriocanal, Miguel Áng...
PODS
2004
ACM
98views Database» more  PODS 2004»
14 years 10 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher