Sciweavers

220 search results - page 34 / 44
» Supporting Queries with Imprecise Constraints
Sort
View
BTW
2007
Springer
236views Database» more  BTW 2007»
14 years 21 days ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
CAISE
1998
Springer
14 years 28 days ago
OMS/Java: Model Extensibility of OODBMS for Advanced Application Domains
We show how model extensibility of object-oriented data management systems can be achieved through the combination of a highlevel core object data model and an architecture designe...
Andreas Steiner, Adrian Kobler, Moira C. Norrie
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 10 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
PKDD
2005
Springer
129views Data Mining» more  PKDD 2005»
14 years 2 months ago
Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
Abstract. The paradigm of pattern discovery based on constraints was introduced with the aim of providing to the user a tool to drive the discovery process towards potentially inte...
Stefano Bistarelli, Francesco Bonchi
CSFW
2004
IEEE
14 years 13 days ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell