Documentos: Recent submissions

  • Luo Bo; Lee Dongwon; Lee Wang-Chien; Liu Peng (2004)
    At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained security enforcement; (2) view-based approaches ...
  • Kalogeraki Vana; Gunopulos Dimitrios; Zeinalipour-Yazti D (2002)
    One important problem in peer-to-peer (P2P) networks is searching and retrieving the correct information. However , existing searching mechanisms in pure peer-to-peer networks are inefficient due to the decentralized nature ...
  • Chen Yi; Mihaila George A; Davidson Susan B; Padmanabhan Sriram (2004)
    As XML becomes an increasingly popular format for information exchange, the efficient processing of broadcast XML data on a constrained device (for example, a cell phone or a PDA) becomes a critical task. In this paper we ...
  • Greco Gianluigi; Scarcello Francesco (2005)
    Peer-to-Peer (P2P) data integration systems have recently attracted significant attention for their ability to manage and share data dispersed over different peer sources. While integrating data for answering user queries, ...
  • Liu Hong-Cheu; Zeleznikow John (2005)
    We develop a fixpoint operator for computing large item sets and demonstrate three query paradigm solutions for association rule mining that use the idea of least fixpoint computation and indicates some optimisation issues. ...
  • Kamps Jaap; Marx Maarten; Rijke Maarten De; Sigurbjörnssonsigurbj¨sigurbjörnsson B ¨ Orkur (2005)
    Document-centric XML is a mixture of text and structure. With the increased availability of document-centric XML content comes a need for query facilities in which both structural constraints and constraints on the content ...
  • Li Changqing; Wang Tok; Ling (2005)
    The method of assigning labels to the nodes of the XML tree is called a labeling scheme. Based on the labels only, both ordered and un-ordered queries can be processed without accessing the original XML file. One more ...
  • Narasimha Maithili; Tsudik Gene (2005)
    Database outsourcing is an important trend which involves data owners farming out their data management needs to an external service provider. One important requirement is to maintain the integrity and authenticity of ...
  • Finance Béatrice; Medjdoub Saïda; Pucheral Philippe (2005)
    With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attention in recent years. Existing models attach ...
  • Aekaterinidis Ioannis; Triantafillou Peter (2005)
    With this work we aim to make a threefold contribution. We first address the issue of supporting efficiently queries over string-attributes involving prefix, suffix, containment, and equality operators in large-scale data ...
  • Arvola Paavo; Junkkari Marko; Kekäläinen Jaana (2005)
    A general re-weighting method, called contextualization, for more efficient element ranking in XML retrieval is introduced. Re-weighting is based on the idea of using the ancestors of an element as a context: if the element ...
  • Grieco Luca; Lembo Domenico; Rosati Riccardo; Ruzzi Marco (2005)
    Research in consistent query answering studies the definition and computation of " meaningful " answers to queries posed to inconsistent databases, i.e., databases whose data do not satisfy the integrity constraints (ICs) ...
  • Roussinov Dmitri; Fan Weiguo; Neves Fernando A Das (2005)
    We present the architecture of our web question answering (fact seeking) system and introduce a novel algorithm to validate semantic categories of the expected answers. When tested on the questions used by the prior research, ...
  • Leonardi Erwin; Bhowmick Sourav S (2005)
    Several relational approaches have been proposed to detect the changes to XML documents by using relational databases. These approaches store the XML documents in the rela-tional database and issue SQL queries (whenever ...
  • Tang Thanh Tin; Hawking David; Craswell Nick; Griffiths Kathy (2005)
    Subject-specific search facilities on health sites are usually built using manual inclusion and exclusion rules. These can be expensive to maintain and often provide incomplete coverage of Web resources. On the other hand, ...
  • Haller Klaus; Schuldt Heiko; Can T ¨; Urker (2005)
    Business processes executing in peer-to-peer environments usually invoke Web services on different, independent peers. Although peer-to-peer environments inherently lack global control, some business processes nevertheless ...
  • Mohan Sriram; Sengupta Arijit; Wu Yuqing (2005)
    Being able to express and enforce role-based access control on XML data is a critical component of XML data management. However, given the semi-structured nature of XML, this is non-trivial, as access control can be applied ...
  • Carminati Barbara; Ferrari Elena; Bertino Elisa (2005)
    Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of users and great amounts of data. A third-party ...
  • Lin Bin; Su Jianwen (2005)
    A critical issue in moving object databases is to develop appropriate indexing structures for continuously moving object locations so that queries can still be performed efficiently. However, such location changes typically ...
  • Qi Naizhen; Kudo Michiharu; Myllymaki Jussi; Pirahesh Hamid (2005)
    XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visible to users depending on their roles. For ...

Search DSpace


Browse

My Account