Sciweavers

501 search results - page 43 / 101
» Simplification of Integrity Constraints for Data Integration
Sort
View
NTMS
2008
IEEE
15 years 10 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj
136
Voted
DEXAW
2002
IEEE
159views Database» more  DEXAW 2002»
15 years 8 months ago
Data Warehouse Clustering on the Web
In collaborative e-commerce environments, interoperation is a prerequisite for data warehouses that are physically scattered along the value chain. Adopting system and information...
Aristides Triantafillakis, Panagiotis Kanellis, Dr...
199
Voted
ICDT
2009
ACM
119views Database» more  ICDT 2009»
16 years 4 months ago
Querying data sources that export infinite sets of views
We study the problem of querying data sources that accept only a limited set of queries, such as sources accessible by Web services which can implement very large (potentially inf...
Bogdan Cautis, Alin Deutsch, Nicola Onose
127
Voted
IJMI
2002
126views more  IJMI 2002»
15 years 3 months ago
Representation primitives, process models and patient data in computer-interpretable clinical practice guidelines: : A literatur
Representation of clinical practice guidelines in a computer-interpretable format is a critical issue for guideline development, implementation, and evaluation. We studied 11 type...
Dongwen Wang, Mor Peleg, Samson W. Tu, Aziz A. Box...
239
Voted
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
16 years 5 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...