Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dke/dke43.bht:"
@article{DBLP:journals/dke/AyanLK02, author = {Necip Fazil Ayan and Wen{-}Syan Li and Okan Kolak}, title = {Automating extraction of logical domains in a web site}, journal = {Data Knowl. Eng.}, volume = {43}, number = {2}, pages = {179--205}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00055-1}, doi = {10.1016/S0169-023X(02)00055-1}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/AyanLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/Barker02, author = {Steve Barker}, title = {Protecting deductive databases from unauthorized retrieval and update requests}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {293--315}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00126-X}, doi = {10.1016/S0169-023X(02)00126-X}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/Barker02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/BertinoCFM02, author = {Elisa Bertino and Silvana Castano and Elena Ferrari and Marco Mesiti}, title = {Protection and administration of {XML} data sources}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {237--260}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00127-1}, doi = {10.1016/S0169-023X(02)00127-1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dke/BertinoCFM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/BerzalCCM02, author = {Fernando Berzal Galiano and Juan C. Cubero and Fernando Cuenca and Juan Miguel Medina}, title = {Relational decomposition through partial functional dependencies}, journal = {Data Knowl. Eng.}, volume = {43}, number = {2}, pages = {207--234}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00056-3}, doi = {10.1016/S0169-023X(02)00056-3}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/BerzalCCM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/BhowmickMN02, author = {Sourav S. Bhowmick and Sanjay Madria and Wee Keong Ng}, title = {What can a web bag discover for you?}, journal = {Data Knowl. Eng.}, volume = {43}, number = {1}, pages = {79--119}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00123-4}, doi = {10.1016/S0169-023X(02)00123-4}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/BhowmickMN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/CandanL02, author = {K. Sel{\c{c}}uk Candan and Wen{-}Syan Li}, title = {Reasoning for Web document associations and its applications in site map construction}, journal = {Data Knowl. Eng.}, volume = {43}, number = {2}, pages = {121--150}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00053-8}, doi = {10.1016/S0169-023X(02)00053-8}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/CandanL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/ChapinFJF02, author = {Susan Chapin and Donald B. Faatz and Sushil Jajodia and Amgad Fayad}, title = {Consistent policy enforcement in distributed systems using mobile policies}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {261--280}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00128-3}, doi = {10.1016/S0169-023X(02)00128-3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/ChapinFJF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/GudesT02, author = {Ehud Gudes and Aharon Tubman}, title = {AutoWF - {A} secure Web workflow system using autonomous objects}, journal = {Data Knowl. Eng.}, volume = {43}, number = {1}, pages = {1--27}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00058-7}, doi = {10.1016/S0169-023X(02)00058-7}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/GudesT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/KimNKK02, author = {Minsoo Kim and Seung J. Noh and Yeongho Kim and Suk{-}Ho Kang}, title = {A customizable view for Web-based {STEP} data}, journal = {Data Knowl. Eng.}, volume = {43}, number = {1}, pages = {29--56}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00101-5}, doi = {10.1016/S0169-023X(02)00101-5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/KimNKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/LiHPCA02, author = {Wen{-}Syan Li and Wang{-}Pin Hsiung and Oliver Po and K. Sel{\c{c}}uk Candan and Divyakant Agrawal}, title = {Evaluations of architectural designs and implementation for database-driven web sites}, journal = {Data Knowl. Eng.}, volume = {43}, number = {2}, pages = {151--177}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00054-X}, doi = {10.1016/S0169-023X(02)00054-X}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/LiHPCA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/NascimentoTCM02, author = {Mario A. Nascimento and Eleni Tousidou and Vishal Chitkara and Yannis Manolopoulos}, title = {Image indexing and retrieval using signature trees}, journal = {Data Knowl. Eng.}, volume = {43}, number = {1}, pages = {57--77}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00122-2}, doi = {10.1016/S0169-023X(02)00122-2}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/NascimentoTCM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/OlivierG02, author = {Martin S. Olivier and Ehud Gudes}, title = {Wrappers - a mechanism to support state-based authorisation in Web applications}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {281--292}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00129-5}, doi = {10.1016/S0169-023X(02)00129-5}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/OlivierG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/Osborn02, author = {Sylvia L. Osborn}, title = {Integrating role graphs: a tool for security integration}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {317--333}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00130-1}, doi = {10.1016/S0169-023X(02)00130-1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/Osborn02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/ThuraisinghamR02, author = {Bhavani Thuraisingham and Reind P. van de Riet}, title = {Data and applications security (Guest editorial)}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {235--236}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00125-8}, doi = {10.1016/S0169-023X(02)00125-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/ThuraisinghamR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.