• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 15,500
Next 10 →

ON INTEGRITY CONSTRAINTS

by Raymond Reitert
"... We address the concept of a static integrity constraint as it arises in databases and Artificial Intelligence knowledge representation languages. Such constraints are meant to characterize the acceptable states of a knowledge base, and are used to enforce these legal states. We adopt the perspective ..."
Abstract - Add to MetaCart
We address the concept of a static integrity constraint as it arises in databases and Artificial Intelligence knowledge representation languages. Such constraints are meant to characterize the acceptable states of a knowledge base, and are used to enforce these legal states. We adopt

Integrity Constraints for XML

by Wenfei Fan, Jérôme Siméon , 1999
"... this paper, we extend XML DTDs with several classes of integrity constraints and investigate the complexity of reasoning about these constraints. The constraints range over keys, foreign keys, inverse constraints as well as ID constraints for capturing the semantics of object identities. They imp ..."
Abstract - Cited by 97 (11 self) - Add to MetaCart
this paper, we extend XML DTDs with several classes of integrity constraints and investigate the complexity of reasoning about these constraints. The constraints range over keys, foreign keys, inverse constraints as well as ID constraints for capturing the semantics of object identities

Integrity Constraints

by unknown authors
"... enforce valid attribute values from domain sets domain set may exclude null values ..."
Abstract - Add to MetaCart
enforce valid attribute values from domain sets domain set may exclude null values

Merging with Integrity Constraints

by Sébastien Konieczny, Ramón Pino Pérez , 1999
"... We consider, in this paper, the problem of knowledge base merging with integrity constraints. We propose a logical characterization of those operators and give a representation theorem in terms of preorders on interpretations. We show the close connection between belief revision and merging oper ..."
Abstract - Cited by 53 (11 self) - Add to MetaCart
We consider, in this paper, the problem of knowledge base merging with integrity constraints. We propose a logical characterization of those operators and give a representation theorem in terms of preorders on interpretations. We show the close connection between belief revision and merging

Integrating Constraints and Metric Learning in Semi-Supervised Clustering

by Mikhail Bilenko, Sugato Basu, Raymond J. Mooney - In ICML , 2004
"... Semi-supervised clustering employs a small amount of labeled data to aid unsupervised learning. Previous work in the area has utilized supervised data in one of two approaches: 1) constraint-based methods that guide the clustering algorithm towards a better grouping of the data, and 2) distanc ..."
Abstract - Cited by 248 (7 self) - Add to MetaCart
Semi-supervised clustering employs a small amount of labeled data to aid unsupervised learning. Previous work in the area has utilized supervised data in one of two approaches: 1) constraint-based methods that guide the clustering algorithm towards a better grouping of the data, and 2

Valid Time Integrity Constraints

by Michael H. Böhlen - Univ of Arizona, Dept of Computer Science, TR , 1994
"... This paper investigates temporal integrity constraints in valid time databases, i.e. databases that capture the time-varying nature of the part of reality being modeled. We first provide a taxonomy of integrity constraints in (temporal) databases in order to establish a common terminology. The ta ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
This paper investigates temporal integrity constraints in valid time databases, i.e. databases that capture the time-varying nature of the part of reality being modeled. We first provide a taxonomy of integrity constraints in (temporal) databases in order to establish a common terminology

Schema Integration with Integrity Constraints

by Stefan Conrad, Michael Höding, Gunter Saake, Ingo Schmitt, Can Türker - Advances in Databases, 15th British National Conf. on Databases, BNCOD 15 , 1997
"... . In this paper we discuss the use and treatment of integrity constraints in the federated database design process. We consider different situations occurring frequently in the schema transformation and schema integration process. Based on that, general rules are given which describe the correct ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
. In this paper we discuss the use and treatment of integrity constraints in the federated database design process. We consider different situations occurring frequently in the schema transformation and schema integration process. Based on that, general rules are given which describe

Towards Transformation of Integrity Constraints and

by Database States
"... Abstract — This paper discusses integrity constraint evolution, from two perspectives: From the perspective of changing the constraint, and from the perspective of consequently changing an existing database state. The paper concentrates on structural models provided by UML class diagrams and OCL inv ..."
Abstract - Add to MetaCart
Abstract — This paper discusses integrity constraint evolution, from two perspectives: From the perspective of changing the constraint, and from the perspective of consequently changing an existing database state. The paper concentrates on structural models provided by UML class diagrams and OCL

Integrating Constraints and Direct Manipulation

by Michael Gleicher - In Proceedings of the 1992 Symposium on Interactive 3D Graphics , 1992
"... In this paper, we present techniques for integrating constraint and direct manipulation approaches to geometric modeling. Direct manipulation positioning techniques are augmented to provide the option of making the relationships they establish persistent. Differential constraint techniques are used ..."
Abstract - Cited by 31 (2 self) - Add to MetaCart
In this paper, we present techniques for integrating constraint and direct manipulation approaches to geometric modeling. Direct manipulation positioning techniques are augmented to provide the option of making the relationships they establish persistent. Differential constraint techniques are used

Integrity Constraints in Trust Management

by Sandro Etalle, et al. , 2005
"... We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust man ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust
Next 10 →
Results 1 - 10 of 15,500
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University