Sciweavers

2338 search results - page 377 / 468
» Using UML to model relational database operations
Sort
View
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 3 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
CSB
2004
IEEE
177views Bioinformatics» more  CSB 2004»
14 years 16 days ago
High-Throughput 3D Structural Homology Detection via NMR Resonance Assignment
One goal of the structural genomics initiative is the identification of new protein folds. Sequence-based structural homology prediction methods are an important means for priorit...
Christopher James Langmead, Bruce Randall Donald
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 9 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ICDT
2007
ACM
126views Database» more  ICDT 2007»
14 years 3 months ago
Combining Incompleteness and Ranking in Tree Queries
Abstract. In many cases, users may want to consider incomplete answers to their queries. Often, however, there is an overwhelming number of such answers, even if subsumed answers a...
Benny Kimelfeld, Yehoshua Sagiv
ADBIS
2006
Springer
100views Database» more  ADBIS 2006»
14 years 2 months ago
Novel Analysis Patterns in the Context of the Managed Investments Instruments
Abstract. Traditionally, the investment funds market exploits analysis and design concepts based on the procedural programming approach. We propose a set of analysis patterns which...
Luigi Ubezio, Claudia Raibulet, Antonio Carpinato