Sciweavers

15372 search results - page 2895 / 3075
» The Semantics of Semantic Annotation
Sort
View
EDBT
2006
ACM
174views Database» more  EDBT 2006»
14 years 11 months ago
Fast Computation of Reachability Labeling for Large Graphs
The need of processing graph reachability queries stems from many applications that manage complex data as graphs. The applications include transportation network, Internet traffic...
Jiefeng Cheng, Jeffrey Xu Yu, Xuemin Lin, Haixun W...
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 11 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
ICIAP
2007
ACM
14 years 11 months ago
Window Detection in Facades
This work is about a novel methodology for window detection in urban environments and its multiple use in vision system applications. The presented method for window detection inc...
Haider Ali, Christin Seifert, Nitin Jindal, Lucas ...
ICSE
2005
IEEE-ACM
14 years 11 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ICFP
2008
ACM
14 years 10 months ago
Mixin' up the ML module system
ML modules provide hierarchical namespace management, as well as fine-grained control over the propagation of type information, but they do not allow modules to be broken up into ...
Derek Dreyer, Andreas Rossberg
« Prev « First page 2895 / 3075 Last » Next »