Sciweavers

227 search results - page 43 / 46
» Ranking-based processing of SQL queries
Sort
View
DNIS
2010
Springer
240views Database» more  DNIS 2010»
14 years 1 months ago
AccKW: An Efficient Access Control Scheme for Keyword-Based Search over RDBMS
Access control for relational databases is a well researched area. An SQL query is allowed or denied access to database according to the specified access control policy. On the oth...
Vikram Goyal, Ashish Sureka, Sangeeta Lal
COMAD
2008
13 years 11 months ago
Exploiting Asynchronous IO using the Asynchronous Iterator Model
Asynchronous IO (AIO) allows a process to continue to do other work while an IO operation initiated earlier completes. AIO allows a large number of random IO operations to be issu...
Suresh Iyengar, S. Sudarshan, Santosh Kumar 0002, ...
BNCOD
2003
127views Database» more  BNCOD 2003»
13 years 11 months ago
Performance Evaluation and Analysis of K-Way Join Variants for Association Rule Mining
Data mining aims at discovering important and previously unknown patterns from the dataset in the underlying database. Database mining performs mining directly on data stored in r...
P. Mishra, Sharma Chakravarthy
HT
2007
ACM
14 years 1 months ago
Lesson learnt from a large-scale industrial semantic web application
The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance o...
Sylvia C. Wong, Richard M. Crowder, Gary B. Wills,...
CCS
2007
ACM
14 years 4 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder