Sciweavers

2036 search results - page 39 / 408
» Using and Abusing XML
Sort
View
BNCOD
2007
104views Database» more  BNCOD 2007»
13 years 11 months ago
Integrity Checking and Maintenance with Active Rules in XML Databases
While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining in...
Henning Christiansen, Maria Rekouts
DBSEC
2006
144views Database» more  DBSEC 2006»
13 years 11 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
EDBTW
2004
Springer
14 years 3 months ago
Clustering XML Documents Using Structural Summaries
This work presents a methodology for grouping structurally similar XML documents using clustering algorithms. Modeling XML documents with tree-like structures, we face the ‘clust...
Theodore Dalamagas, Tao Cheng, Klaas-Jan Winkel, T...
APWEB
2005
Springer
14 years 3 months ago
Voice User Interface Design for a Telephone Application Using VoiceXML
VoiceXML is a standard language for developing voice based applications. VoiceXML applications have more advantages over traditional Interactive Voice Response (IVR) systems becaus...
Daniel Mecanovic, Hao Shi
JAIS
2002
120views more  JAIS 2002»
13 years 9 months ago
Information Exchange Between Humanitarian Organizations: Using the XML Schema IDML
This article explains challenges that arise when humanitarian organizations want to coordinate their development activities by means of distributed information systems. It focuses...
Stefan Hüsemann