Sciweavers

2036 search results - page 54 / 408
» Using and Abusing XML
Sort
View
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 11 months ago
XML Views as Integrity Constraints and their Use in Query Translation
The SQL queries produced in XML-to-SQL query translation are often unnecessarily complex, even for simple input XML queries. In this paper we argue that relational systems can do ...
Rajasekar Krishnamurthy, Raghav Kaushik, Jeffrey F...
ICDE
2010
IEEE
192views Database» more  ICDE 2010»
14 years 5 months ago
XML reasoning made practical
— We present a tool for the static analysis of XPath queries and XML Schemas. The tool introduces techniques used in the field of verification (such as binary decision diagrams...
Pierre Genevès, Nabil Layaïda
RAID
1999
Springer
14 years 2 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
WWW
2006
ACM
14 years 11 months ago
Merging trees: file system and content integration
XML is the predominant format for representing structured information inside documents, but it stops at the level of files. This makes it hard to use XML-oriented tools to process...
Erik Wilde
ICSEA
2006
IEEE
14 years 4 months ago
A Partition-Based Approach for XPath Testing
—The XML language is becoming the preferred means of data interchange and representation in web based applications. Usually, XML data is stored in XML repositories, which can be ...
Claudio de la Riva, José García-Fanj...