Sciweavers

641 search results - page 108 / 129
» Simplifying schema mappings
Sort
View
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
TKDE
2008
128views more  TKDE 2008»
13 years 7 months ago
A Virtual Ring Method for Building Small-World Structured P2P Overlays
This paper presents a general virtual ring method to design and analyze small-world structured P2P networks on the base es embedded in ID spaces with distance metric. Its basic ide...
Hai Zhuge, Xiaoping Sun
WS
2008
ACM
13 years 7 months ago
The semantic web as a newspaper media convergence facilitator
Newspapers are evolving and this causes great changes in how newspapers reach their consumers, but also in how newspapers work internally. Advanced computerised support is needed ...
Roberto García, Ferran Perdrix, Rosa Gil, M...
PVLDB
2008
117views more  PVLDB 2008»
13 years 6 months ago
Interactive source registration in community-oriented information integration
Modern Internet communities need to integrate and query structured information. Employing current information integration infrastructure, data integration is still a very costly e...
Yannis Katsis, Alin Deutsch, Yannis Papakonstantin...
DEBU
2010
127views more  DEBU 2010»
13 years 4 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...