Sciweavers

1004 search results - page 84 / 201
» Safe Constraint Queries
Sort
View
SAC
2004
ACM
14 years 2 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
VLDB
2002
ACM
133views Database» more  VLDB 2002»
14 years 9 months ago
Tree pattern query minimization
: Purpose ? Tree pattern is at the core of XML queries. The tree patterns in XML queries typically contain redundancies, especially when broad integrity constraints (ICs) are prese...
Sihem Amer-Yahia, SungRan Cho, Laks V. S. Lakshman...
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
14 years 10 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
SOCO
2010
Springer
13 years 3 months ago
Reasoning about fuzzy temporal information from the web: towards retrieval of historical events
Abstract When searching for information about historical events, queries are naturally formulated using temporal constraints. However, the structured temporal information needed to...
Steven Schockaert, Martine De Cock, Etienne E. Ker...
SDM
2004
SIAM
225views Data Mining» more  SDM 2004»
13 years 10 months ago
Active Semi-Supervision for Pairwise Constrained Clustering
Semi-supervised clustering uses a small amount of supervised data to aid unsupervised learning. One typical approach specifies a limited number of must-link and cannotlink constra...
Sugato Basu, Arindam Banerjee, Raymond J. Mooney