By Topic

IEEE Transactions on Knowledge and Data Engineering

Issue 1 • Date Feb. 1996

Filter Results

Displaying Results 1 - 18 of 18
  • Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (250 KB)
    Freely Available from IEEE
  • Constructing efficient belief network structures with expert provided information

    Publication Year: 1996, Page(s):134 - 143
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1232 KB)

    Presents a technique to construct efficient belief network structures for application areas where large amounts of data are available and information on the ordering of the variables can be obtained from domain experts. We identify classes of networks that are efficient for propagating beliefs. We formulate the problem as one of determining the belief network representation from a given class that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic search: analysis using fitness moments

    Publication Year: 1996, Page(s):120 - 133
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1420 KB)

    Genetic algorithms (GAs) are efficient and robust search methods that are being employed in a plethora of applications with extremely large search spaces. The directed search mechanism employed in GAs performs a simultaneous and balanced exploration of new regions in the search space and exploitation of already-discovered regions. This paper introduces the notion of fitness moments for analyzing t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge processing in control systems

    Publication Year: 1996, Page(s):106 - 119
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1456 KB)

    A real-time knowledge processing procedure is proposed for rule-based systems in general and control systems applications in particular. Distinguishing features of the procedure include a mechanism for rule base compression and an inference scheme based on matrix operators. The procedure is also amenable for schedulability analysis to provide response time warranty. An application concerning super... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of the Ariel active database rule system

    Publication Year: 1996, Page(s):157 - 172
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1780 KB)

    Describes the design and implementation of the Ariel DBMS and its tightly-coupled forward-chaining rule system. The query language of Ariel is a subset of POSTQUEL (the POSTGRES QUEry Language), extended with a new production-rule sublanguage. Ariel supports traditional relational database query and update operations efficiently, using a System R-like query processing strategy. In addition, the Ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A trusted subject architecture for multilevel secure object-oriented databases

    Publication Year: 1996, Page(s):16 - 31
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1752 KB)

    We address security in object-oriented database systems for multilevel secure environments. Such an environment consists of users cleared to various security levels, accessing information labeled with varying classifications. Our purpose is three-fold. First, we show how security can be naturally incorporated into the object model of computing so as to form a foundation for building multilevel sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wizard: a database inference analysis and detection system

    Publication Year: 1996, Page(s):56 - 66
    Cited by:  Papers (12)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1448 KB)

    The database inference problem is a well-known problem in database security and information system security in general. In order to prevent an adversary from inferring classified information from combinations of unclassified information, a database inference analyst must be able to detect and prevent possible inferences. Detecting database inference problems at database design time provides great ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A note on “Incomplete relational database models based on intervals”

    Publication Year: 1996, Page(s):189 - 191
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    For original paper, see A. Ola and G. Ozsoyoglu, ibid., vol. 5, no. 2, pp. 293-308 (1993). In that paper, a family of relational database models (M-1 to M-5) were proposed to represent unknown values by intervals. Relational operators were extended for evaluating queries on these models. In this paper, we stultify the theorems, claiming that query evaluation in models M-2, M-3 and M-5 is sound View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uncertainty management in expert systems using fuzzy Petri nets

    Publication Year: 1996, Page(s):96 - 105
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB)

    The paper aims at developing new techniques for uncertainty management in expert systems for two generic class of problems using fuzzy Petri nets that represent logical connectivity among a set of imprecise propositions. One class of problems deals with the computation of fuzzy belief of any proposition from the fuzzy beliefs of a set of independent initiating propositions in a given network. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-granularity locking model for concurrency control in object-oriented database systems

    Publication Year: 1996, Page(s):144 - 156
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1328 KB)

    A locking model adopting a multi-granularity approach is proposed for concurrency control in object-oriented database systems. The model is motivated by a desire to provide high concurrency and low locking overhead in accessing objects. Locking in schemas and locking in instances are developed separately and then are integrated. Schema changes and composite objects are also taken into account. A d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect of knowledge representation schemes on maintainability of knowledge-based systems

    Publication Year: 1996, Page(s):173 - 178
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    Uses an experimental approach to investigate the representational effects of knowledge on maintainability, and compares this with the structural effects of rule sets investigated by Davis (1990). Results show that an object-based system, compared to a structured rule-based system, was easier to maintain in terms of the time to do the maintenance tasks, but not necessarily in terms of accuracy of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correctness criteria for multilevel secure transactions

    Publication Year: 1996, Page(s):32 - 45
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1492 KB)

    The benefits of distributed systems and shared database resources are widely recognized, but they often cannot be exploited by users who must protect their data by using label-based access controls. In particular, users of label-based data need to read and write data at different security levels within a single database transaction, which is not currently possible without violating multilevel secu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MAC policy framework for multilevel relational databases

    Publication Year: 1996, Page(s):3 - 15
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1420 KB)

    We develop a formal framework of MAC policies in multilevel relational databases. We identify the important components of MAC policies and their desirable properties. The framework provides a basis for systematically specifying MAC policies and characterizing their potential mismatches. Based on the framework, we compare and unify the MAC policies and policy components that are proposed in the lit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge-based control architecture with interactive reasoning functions

    Publication Year: 1996, Page(s):179 - 183
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    A knowledge-based system architecture called IPEX is presented that uses a time-distributed, interactive reasoning paradigm for process control applications. Structural features of the system are presented, and it is shown that temporal considerations are included in each of the system's data structures either explicitly or implicitly. Diagnostic planning is discussed, and explanations of the algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inference in MLS database systems

    Publication Year: 1996, Page(s):46 - 55
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1108 KB)

    Database systems that contain information of varying degrees of sensitivity pose the threat that some of the low data may infer high data. This study derives conditions sufficient to identify such inference threats. First, it is reasoned that a database can only control material implications, as specified in formal logic systems. These material implications are found using knowledge discovery tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A temporal access control mechanism for database systems

    Publication Year: 1996, Page(s):67 - 80
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1504 KB)

    The paper presents a discretionary access control model in which authorizations contain temporal intervals of validity. An authorization is automatically revoked when the associated temporal interval expires. The proposed model provides rules for the automatic derivation of new authorizations from those explicitly specified. Both positive and negative authorizations are supported. A formal definit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule revision with recurrent neural networks

    Publication Year: 1996, Page(s):183 - 188
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Recurrent neural networks readily process, recognize and generate temporal sequences. By encoding grammatical strings as temporal sequences, recurrent neural networks can be trained to behave like deterministic sequential finite-state automata. Algorithms have been developed for extracting grammatical rules from trained networks. Using a simple method for inserting prior knowledge (or rules) into ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An access control model and its use in representing mental health application access policy

    Publication Year: 1996, Page(s):81 - 95
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1668 KB)

    The paper considers an access control model and proposes extensions to it to deal with authentication and revocation. The model is then applied to represent access control policy in a mental health system. In the first part of the paper, extensions to the schematic protection model (SPM) are presented. The authentication and revocation extensions are independent of one another in the sense that ea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology