Sciweavers

452 search results - page 40 / 91
» Updating relational data via SPARQL update
Sort
View
CSREASAM
2006
14 years 4 days ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
SIGMOD
2010
ACM
267views Database» more  SIGMOD 2010»
14 years 3 months ago
Processing proximity relations in road networks
Applications ranging from location-based services to multi-player online gaming require continuous query support to monitor, track, and detect events of interest among sets of mov...
Zhengdao Xu, Hans-Arno Jacobsen
BTW
2007
Springer
121views Database» more  BTW 2007»
14 years 5 months ago
Algorithms for merged indexes
B-tree and index into two layers of abstraction. In addition, this paper provides algorithms for (i) concurrency control and recovery including locking of individual keys and of co...
Goetz Graefe
SEBD
2003
154views Database» more  SEBD 2003»
14 years 3 days ago
Management of User Preferences in Data Intensive Applications
Abstract. The management of user preferences is becoming a fundamental ingredient of modern Web-based data-intensive applications, in which information filtering is crucial to red...
Riccardo Torlone, Paolo Ciaccia
NAR
2010
174views more  NAR 2010»
13 years 5 months ago
BeetleBase in 2010: revisions to provide comprehensive genomic information for Tribolium castaneum
BeetleBase (http://www.beetlebase.org) has been updated to provide more comprehensive genomic information for the red flour beetle Tribolium castaneum. The database contains genom...
Hee Shin Kim, Terence Murphy, Jing Xia, Doina Cara...