Sciweavers

2492 search results - page 82 / 499
» Ontology-based Database Access
Sort
View
GVD
2004
113views Database» more  GVD 2004»
13 years 12 months ago
A Flexible Architecture for a Push-based P2P Database
Originally developed for file sharing, P2P concepts are predestinated to realize information sharing in a more general way. Combined with the well known concept of loosely coupled...
Cristian Pérez de Laborda, Christopher Popf...
PODS
2006
ACM
138views Database» more  PODS 2006»
14 years 10 months ago
Efficiently ordering subgoals with access constraints
d Abstract] Guizhen Yang Artificial Intelligence Center SRI International Menlo Park, CA 94025, USA Michael Kifer Dept. of Computer Science Stony Brook University Stony Brook, NY 1...
Guizhen Yang, Michael Kifer, Vinay K. Chaudhri
INFOCOM
1999
IEEE
14 years 2 months ago
Enhancing Survivability of Mobile Internet Access Using Mobile IP with Location Registers
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
13 years 10 months ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell
WORDS
2005
IEEE
14 years 4 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...