Sciweavers

1125 search results - page 58 / 225
» Query Answering in Inconsistent Databases
Sort
View
ISI
2006
Springer
13 years 10 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 11 months ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...
GCC
2005
Springer
14 years 3 months ago
Query Optimization in Database Grid
DarGridâ…ˇ is an implemented database gird system whose goal is to provide a semantic solution for integrating database resources on the web. Although many algorithms have been pro...
Xiaoqing Zheng, Huajun Chen, Zhaohui Wu, Yuxin Mao
ICDT
2009
ACM
149views Database» more  ICDT 2009»
14 years 10 months ago
Query languages for data exchange: beyond unions of conjunctive queries
The class of unions of conjunctive queries (UCQ) has been shown to be particularly well-behaved for data exchange; its certain answers can be computed in polynomial time (in terms...
Juan Reutter, Marcelo Arenas, Pablo Barceló
SIGMOD
1990
ACM
76views Database» more  SIGMOD 1990»
14 years 2 months ago
Querying Database Knowledge
The role of database knowledge 1susually limited to the evaluation of data queries In this paper we argue that when this knowledge 1sof substantial volume and complexity, there 1s...
Amihai Motro, Qiuhui Yuan