Sciweavers

1317 search results - page 159 / 264
» context 2005
Sort
View
SIGMOD
2005
ACM
212views Database» more  SIGMOD 2005»
14 years 9 months ago
A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification
Data integrated from multiple sources may contain inconsistencies that violate integrity constraints. The constraint repair problem attempts to find "low cost" changes t...
Philip Bohannon, Michael Flaster, Wenfei Fan, Raje...
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
14 years 9 months ago
Constrained Optimalities in Query Personalization
Personalization is a powerful mechanism that helps users to cope with the abundance of information on the Web. Database query personalization achieves this by dynamically construc...
Georgia Koutrika, Yannis E. Ioannidis
SIGMOD
2005
ACM
108views Database» more  SIGMOD 2005»
14 years 9 months ago
Guaranteeing Correctness and Availability in P2P Range Indices
New and emerging P2P applications require sophisticated range query capability and also have strict requirements on query correctness, system availability and item availability. W...
Prakash Linga, Adina Crainiceanu, Johannes Gehrke,...
SIGMOD
2005
ACM
100views Database» more  SIGMOD 2005»
14 years 9 months ago
Events on the edge
The emergence of large-scale receptor-based systems has enabled applications to execute complex business logic over data generated from monitoring the physical world. An important...
Shariq Rizvi, Shawn R. Jeffery, Sailesh Krishnamur...
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 9 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi