Sciweavers

1986 search results - page 233 / 398
» constraints 2006
Sort
View
CAISE
2006
Springer
13 years 12 months ago
Adaptive Query Formulation to Handle Database Evolution
Databases are continuously evolving environments, where design constructs are added, removed or updated quite often. Research has extensively dealt with the problem of database evo...
George Papastefanatos, Panos Vassiliadis, Yannis V...
CAISE
2006
Springer
13 years 12 months ago
Experiences with Modeling and Verification of Regulations
Information system models commonly describe organizations in terms of the structure of the data they use, the organization of the processes they perform and the operations that wil...
Jan Vanthienen, Christophe Mues, Stijn Goedertier
CCS
2006
ACM
13 years 12 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...
CIKM
2006
Springer
13 years 12 months ago
Maximizing the sustained throughput of distributed continuous queries
Monitoring systems today often involve continuous queries over streaming data, in a distributed collaborative system. The distribution of query operators over a network of process...
Ioana Stanoi, George A. Mihaila, Themis Palpanas, ...
COCOON
2006
Springer
13 years 12 months ago
A Detachment Algorithm for Inferring a Graph from Path Frequency
: Inferring graphs from path frequency has been studied as an important problem which has a potential application to drug design and elucidation of chemical structures. Given a mul...
Hiroshi Nagamochi