• No results found

relational algebra operations

Formal authorization approaches for permission-role assignments using relational algebra operations

Formal authorization approaches for permission-role assignments using relational algebra operations

... To solve the problems, this paper presents an authoriza- tion granting algorithm, and weak revocation and strong revocation algorithms that are based on relational algebra operations. The algorithms ...

11

Formal authorization allocation approaches for role-based access control based on relational algebra operations

Formal authorization allocation approaches for role-based access control based on relational algebra operations

... and relational databases are presented in ...a relational database with discre- tionary access ...standard relational databases. Some relational concepts like roles, users and permissions etc ...

10

Title: Roll of Relational Algebra and Query Optimizer in Different Types of DBMS

Title: Roll of Relational Algebra and Query Optimizer in Different Types of DBMS

... normal algebra except it uses relations as values instead of numbers and the operations and operators are ...about relational algebra to understand query execution and optimization in a ...

11

Volume 64: Programming and Computer Languages 2013

Volume 64: Programming and Computer Languages 2013

... In this work, an ongoing work is presented, enabling more powerful and less restrictive forms of SQL queries (w.r.t. current DBMS’s) in the deductive system DES (Datalog Educational Sys- tem) [SCG11], a system targeted ...

23

A Ramsey algebraic study of matrices

A Ramsey algebraic study of matrices

... While the paper has shed more light on the behavior of heterogeneous Ramsey algebras, algebras for which heterogeneous operations are present remain elusive. The only heterogeneous algebras admitting such ...

14

Parallel Iterative Solution of the Hermite Collocation Equations on GPUs

Parallel Iterative Solution of the Hermite Collocation Equations on GPUs

... GPU [14] connected via a PCI-e gen2 slot. The GPU has 6GB of memory and 448 cores on 14 multiprocessors. The application is developed in double precision Fortran code using OpenMP [15], [16] and OpenACC [17] standards ...

6

Secure  Data  Access  In Cloud With  Multi-User Encrypted Sql  Operations

Secure Data Access In Cloud With Multi-User Encrypted Sql Operations

... SQL operations on encrypted data leave access control to the cloud provider or enforce it through an intermediate trusted ...SQL operations on encrypted ...

10

Semantic Retrieval for the Accurate Identification of Relational Concepts in Massive Textbases

Semantic Retrieval for the Accurate Identification of Relational Concepts in Massive Textbases

... region algebra allow us to express shared structures and are necessary in order to describe predicate argument ...region algebra that represents the predicate argument structure of “CRP excludes ...

8

AN INTRODUCTION TO BOOLEAN ALGEBRAS

AN INTRODUCTION TO BOOLEAN ALGEBRAS

... ( ⇐ = ) Assume that ΣX < 1. Then there exist a ∈ X such that ΣX = a and a < 1. But then X is not maximal since X is a pairwise disjoint family and Σ X ∪ {−a} = 1. Definition 5.9. For a Boolean algebra A and ...

53

Eckert, Michael
  

(2008):


	Complex Event Processing with XChangeEQ: Language Design, Formal Semantics, and Incremental Evaluation for Querying Events.


Dissertation, LMU München: Fakultät für Mathematik, Informatik und Statistik

Eckert, Michael (2008): Complex Event Processing with XChangeEQ: Language Design, Formal Semantics, and Incremental Evaluation for Querying Events. Dissertation, LMU München: Fakultät für Mathematik, Informatik und Statistik

... algebra expressions. Simple event queries give rise to the base relations in these expressions. Complex event queries use the a set of operators that together form a special variant of relational ...

301

Securing Data in Document Oriented Database MongoDB

Securing Data in Document Oriented Database MongoDB

... ABSTRACT: Space, Time and Privacy have become a key requirement for database management systems. NoSQL datastores, namely highly compress data on non relational database management systems, which often support ...

7

Governing Embedded Partner Networks: Certification and Partner Communities in the IT Sector

Governing Embedded Partner Networks: Certification and Partner Communities in the IT Sector

... 2006). Relational embeddedness is tightly linked with the norm of helping each other on online networks (Matzat, ...existing relational embeddedness but can also directly improve the knowledge benefits of ...

52

PP 2009 44: 
  Categorial versus Modal Information Theory

PP 2009 44: Categorial versus Modal Information Theory

... These differences also show up in the imagery found in discussions of the ‘information’ in logical systems. For instance, the Lambek operations are often read (I do it myself when teaching) in terms of ...

10

k–Semi–Similar Interval–Valued Fuzzy Matrices

k–Semi–Similar Interval–Valued Fuzzy Matrices

... In this paper, we deal with interval-valued fuzzy matrices (IVFM) that is, matrices whose entries are intervals and all the intervals are subintervals of the interval [0, 1]. Recently, the concept of IVFM a ...

5

Extensions of the System N of Natural Numbers Assigned to Primary Teachers

Extensions of the System N of Natural Numbers Assigned to Primary Teachers

... This paper has resulted from a discussion conducted about which content of mathematics course should be the most suitable for the students of the insti- tutions where primary teachers are educated and when such a course ...

13

New Operations on Intuitionistic Fuzzy Multisets

New Operations on Intuitionistic Fuzzy Multisets

... In this paper we proposed some new operations on intuitionistic fuzzy multisets (IFMSs), deduced some theorems with respect to the algebra of IFMSs and modal operators on I[r] ...

7

Approximate solutions of hybrid stochastic pantograph equations with Levy jumps

Approximate solutions of hybrid stochastic pantograph equations with Levy jumps

... Advances in Hindawi Publishing Corporation http://www.hindawi.com Algebra Advances in Operations Research Decision Sciences Volume 2014 Hindawi Publishing Corporation http://www.hindawi[r] ...

16

Detection and Counting of Vehicles in A High Way Traffic Videos

Detection and Counting of Vehicles in A High Way Traffic Videos

... Mathematical morphology is used for analyzing object shape characteristics such as size and connectivity, which are not easily accessed by linear approaches. Morphological operations are used for image ...

9

Finite state intensional semantics

Finite state intensional semantics

... Kleene algebra with tests (Kozen, 1997), the Kleene elements are Step, Turn, Look, and the propositions in (30) are generators for the Boolean algebra of ...Kleene algebra with ...

12

Representation of Steinitz's lattice in lattices of substructures of relational structures

Representation of Steinitz's lattice in lattices of substructures of relational structures

... certain relational structure has some lattice of substructures, which is isomorphic to Steinitz’s ...this relational structure is ...of relational structures, in particular — universal ...

18

Show all 8196 documents...

Related subjects