Sciweavers

2492 search results - page 75 / 499
» Ontology-based Database Access
Sort
View
VLDB
2003
ACM
141views Database» more  VLDB 2003»
14 years 10 months ago
Computing complete answers to queries in the presence of limited access patterns
In data applications such as information integration, there can be limited access patterns to relations, i.e., binding patterns require values to be specified for certain attribut...
Chen Li
HIPC
2000
Springer
14 years 2 months ago
Meta-data Management System for High-Performance Large-Scale Scientific Data Access
Many scientific applications manipulate large amount of data and, therefore, are parallelized on high-performance computing systems to take advantage of their computational power a...
Wei-keng Liao, Xiaohui Shen, Alok N. Choudhary
WSC
1998
13 years 11 months ago
Array-driven Simulation of Real Databases
A method to represent actual relational databases with arrays for simulation modeling of their performance as part of a software/hardware system has been created. The method inclu...
William S. Keezer
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 10 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 4 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...