Sciweavers

349 search results - page 16 / 70
» Symmetrically exploiting XML
Sort
View
VLDB
2005
ACM
126views Database» more  VLDB 2005»
14 years 3 months ago
Hubble: An Advanced Dynamic Folder Technology for XML
A significant amount of information is stored in computer systems today, but people are struggling to manage their documents such that the information is easily found. XML is a de...
Ning Li, Joshua Hui, Hui-I Hsiao, Kevin S. Beyer
VLDB
2002
ACM
133views Database» more  VLDB 2002»
14 years 10 months ago
Tree pattern query minimization
: Purpose ? Tree pattern is at the core of XML queries. The tree patterns in XML queries typically contain redundancies, especially when broad integrity constraints (ICs) are prese...
Sihem Amer-Yahia, SungRan Cho, Laks V. S. Lakshman...
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 10 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
IJAOSE
2007
82views more  IJAOSE 2007»
13 years 10 months ago
West2East: exploiting WEb Service Technologies to Engineer Agent-based SofTware
This paper describes West2East, a Computer-Aided Agent-Oriented Software Engineering toolkit aimed at supporting the implementation of multiagent systems. West2East exploits langua...
Giovanni Casella, Viviana Mascardi
DEBU
2002
107views more  DEBU 2002»
13 years 9 months ago
Exploiting Web Service Semantics: Taxonomies vs. Ontologies
Comprehensive semantic descriptions of Web services are essential to exploit them in their full potential, that is, discovering them dynamically, and enabling automated service ne...
Asuman Dogac, Gokce Laleci, Yildiray Kabak, Ibrahi...