Sciweavers

4615 search results - page 871 / 923
» Virtual Classes and Their Implementation
Sort
View
CADE
2005
Springer
14 years 10 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
VLDB
2005
ACM
185views Database» more  VLDB 2005»
14 years 10 months ago
Storing and querying XML data using denormalized relational databases
XML database systems emerge as a result of the acceptance of the XML data model. Recent works have followed the promising approach of building XML database management systems on un...
Andrey Balmin, Yannis Papakonstantinou
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 10 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
14 years 10 months ago
Semantics and Evaluation Techniques for Window Aggregates in Data Streams
A windowed query operator breaks a data stream into possibly overlapping subsets of data and computes results over each. Many stream systems can evaluate window aggregate queries....
Jin Li, David Maier, Kristin Tufte, Vassilis Papad...
SIGMOD
2003
ACM
175views Database» more  SIGMOD 2003»
14 years 10 months ago
WinMagic : Subquery Elimination Using Window Aggregation
Database queries often take the form of correlated SQL queries. Correlation refers to the use of values from the outer query block to compute the inner subquery. This is a conveni...
Calisto Zuzarte, Hamid Pirahesh, Wenbin Ma, Qi Che...