Sciweavers

1004 search results - page 17 / 201
» Safe Constraint Queries
Sort
View
KDD
2002
ACM
150views Data Mining» more  KDD 2002»
16 years 3 months ago
Querying multiple sets of discovered rules
Rule mining is an important data mining task that has been applied to numerous real-world applications. Often a rule mining system generates a large number of rules and only a sma...
Alexander Tuzhilin, Bing Liu
POPL
2007
ACM
16 years 3 months ago
Semantics of static pointcuts in aspectJ
In aspect-oriented programming, one can intercept events by writing patterns called pointcuts. The pointcut language of the most popular aspect-oriented programming language, Aspe...
Pavel Avgustinov, Elnar Hajiyev, Neil Ongkingco, O...
LCC
1994
213views Algorithms» more  LCC 1994»
15 years 7 months ago
Linear Constraint Query Languages: Expressive Power and Complexity
We give an AC0 upper bound on the complexity of rst-oder queries over (in nite) databases de ned by restricted linear constraints. This result enables us to deduce the non-expressi...
Stéphane Grumbach, Jianwen Su, Christophe T...
GLOBE
2008
Springer
15 years 4 months ago
Query Propagation in a P2P Data Integration System in the Presence of Schema Constraints
This paper addresses the problem of data integration in a P2P environment, where each peer stores schema of its local data, mappings between the schemas, and some schema constraint...
Tadeusz Pankowski
EDBTW
2004
Springer
15 years 8 months ago
Query Answering in Peer-to-Peer Data Exchange Systems
The problem of answering queries posed to a peer who is a member of a peer-to-peerdataexchangesystemisstudied.Theanswershavetobeconsistentwrt to both the local semantic constraints...
Leopoldo E. Bertossi, Loreto Bravo