Sciweavers

1004 search results - page 80 / 201
» Safe Constraint Queries
Sort
View
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 10 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
BTW
2007
Springer
121views Database» more  BTW 2007»
14 years 3 months ago
Algorithms for merged indexes
B-tree and index into two layers of abstraction. In addition, this paper provides algorithms for (i) concurrency control and recovery including locking of individual keys and of co...
Goetz Graefe
ICDE
2009
IEEE
101views Database» more  ICDE 2009»
14 years 10 months ago
Power Hints for Query Optimization
Commercial database systems expose query hints to address situations in which the optimizer chooses a poor plan for a given query. However, current query hints are not flexible eno...
Nicolas Bruno, Surajit Chaudhuri, Ravishankar Rama...
DBPL
2001
Springer
133views Database» more  DBPL 2001»
14 years 1 months ago
A Theory of Spatio-Temporal Database Queries
Abstract. We address a fundamental question concerning spatio-temporal database systems: “What are exactly spatio-temporal queries?” We define spatio-temporal queries to be co...
Floris Geerts, Sofie Haesevoets, Bart Kuijpers
ISMIS
2011
Springer
12 years 11 months ago
Data Access Paths in Processing of Sets of Frequent Itemset Queries
Abstract. Frequent itemset mining can be regarded as advanced database querying where a user specifies the dataset to be mined and constraints to be satisfied by the discovered i...
Piotr Jedrzejczak, Marek Wojciechowski