Sciweavers

4397 search results - page 49 / 880
» Relational Algebra Operations
Sort
View
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 7 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
IS
2007
13 years 7 months ago
Semantic optimization techniques for preference queries
Preference queries are relational algebra or SQL queries that contain occurrences of the winnow operator (find the most preferred tuples in a given relation). Such queries are pa...
Jan Chomicki
DLOG
2008
13 years 10 months ago
Locality and Subsumption Testing in EL and Some of its Extensions
Abstract. We show that subsumption problems in EL and related description logics can be expressed as uniform word problems in classes of semilattices with monotone operators. We us...
Viorica Sofronie-Stokkermans
AML
2006
83views more  AML 2006»
13 years 7 months ago
The Medvedev lattice of computably closed sets
Simpson introduced the lattice P of 0 1 classes under Medvedev reducibility. Questions regarding completeness in P are related to questions about measure and randomness. We presen...
Sebastiaan Terwijn
EDBTW
2006
Springer
13 years 9 months ago
The Importance of Algebra for XML Query Processing
Abstract. Relational algebra has been a crucial foundation for relational database systems, and has played a large role in enabling their success. A corresponding XML algebra for X...
Stelios Paparizos, H. V. Jagadish