Sciweavers

404 search results - page 19 / 81
» Querying Data under Access Limitations
Sort
View
ADC
2008
Springer
112views Database» more  ADC 2008»
14 years 2 months ago
Semantics based Buffer Reduction for Queries over XML Data Streams
With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buff...
Chi Yang, Chengfei Liu, Jianxin Li, Jeffrey Xu Yu,...
SIGMOD
2002
ACM
198views Database» more  SIGMOD 2002»
14 years 7 months ago
Processing complex aggregate queries over data streams
Recent years have witnessed an increasing interest in designing algorithms for querying and analyzing streaming data (i.e., data that is seen only once in a fixed order) with only...
Alin Dobra, Minos N. Garofalakis, Johannes Gehrke,...
SDMW
2004
Springer
14 years 1 months ago
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms
Abstract. Due to the growing interest in XML security, various access control schemes have been proposed recently. However, little effort has been put forth to facilitate a unifor...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
SIGMETRICS
2011
ACM
208views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
Structure-aware sampling on data streams
The massive data streams observed in network monitoring, data processing and scientific studies are typically too large to store. For many applications over such data, we must ob...
Edith Cohen, Graham Cormode, Nick G. Duffield
CSREAEEE
2006
120views Business» more  CSREAEEE 2006»
13 years 9 months ago
Object Caching Model for Cell Phone Mobile Database
- Inherent limitations of mobile computing environment such as limited bandwidth, limited resourced mobile phones, and instability of wireless environment require summarized mobile...
Khubaib Ahmed Qureshi