Sciweavers

230 search results - page 23 / 46
» Type Derivation Using the Projection Operation
Sort
View
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
14 years 2 months ago
Incremental Validation of String-Based XML Data in Databases, File Systems, and Streams
Although the native (tree-like) storage of XML data becomes more and more important there will be an enduring demand to manage XML data in its textual representation, for instance ...
Beda Christoph Hammerschmidt, Christian Werner, Yl...
ISD
1999
Springer
262views Database» more  ISD 1999»
14 years 5 days ago
Spatial Pictogram Enhanced Conceptual Data Models and Their Translation to Logical Data Models
The successful development of any geographic information system project needs the careful design and implementation of spatial databases via conceptual and logical data-modeling. T...
Shashi Shekhar, Ranga Raju Vatsavai, Sanjay Chawla...
SACMAT
2003
ACM
14 years 1 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
CGF
2007
157views more  CGF 2007»
13 years 8 months ago
Mesh Segmentation via Spectral Embedding and Contour Analysis
We propose a mesh segmentation algorithm via recursive bisection where at each step, a sub-mesh embedded in 3D is first spectrally projected into the plane and then a contour is ...
Rong Liu, Hao Zhang 0002
SACMAT
2010
ACM
14 years 22 days ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam