Search the dblp DataBase
Xiaolei Qian :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xiaolei Qian , Gio Wiederhold Incremental Recomputation of Active Relational Expressions. [Citation Graph (30, 15)][DBLP ] IEEE Trans. Knowl. Data Eng., 1991, v:3, n:3, pp:337-341 [Journal ] Xiaolei Qian Query Folding. [Citation Graph (16, 13)][DBLP ] ICDE, 1996, pp:48-55 [Conf ] Xiaolei Qian , Gio Wiederhold Knowledge-based Integrity Constraint Validation. [Citation Graph (12, 10)][DBLP ] VLDB, 1986, pp:3-12 [Conf ] Xiaolei Qian , Douglas R. Smith Integrity Constraint Reformulation for Efficient Validation. [Citation Graph (10, 17)][DBLP ] VLDB, 1987, pp:417-425 [Conf ] Xiaolei Qian An Effective Method for Integrity Constraint Simplification. [Citation Graph (9, 17)][DBLP ] ICDE, 1988, pp:338-345 [Conf ] Gio Wiederhold , Xiaolei Qian Modeling Asynchrony in Distributed Databases. [Citation Graph (9, 15)][DBLP ] ICDE, 1987, pp:246-250 [Conf ] Xiaolei Qian , Richard J. Waldinger A Transaction Logic for Database Specification. [Citation Graph (7, 15)][DBLP ] SIGMOD Conference, 1988, pp:243-250 [Conf ] Xiaolei Qian An Axiom System for Database Transactions. [Citation Graph (7, 0)][DBLP ] Inf. Process. Lett., 1990, v:36, n:4, pp:183-189 [Journal ] H. V. Jagadish , Xiaolei Qian Integrity Maintenance in Object-Oriented Databases. [Citation Graph (6, 26)][DBLP ] VLDB, 1992, pp:469-480 [Conf ] Xiaolei Qian , Teresa F. Lunt Tuple-level vs Element-level Classification. [Citation Graph (4, 0)][DBLP ] DBSec, 1992, pp:301-316 [Conf ] Xiaolei Qian The Expressive Power of the Bounded-Iteration Construct. [Citation Graph (4, 0)][DBLP ] Acta Inf., 1991, v:28, n:7, pp:631-656 [Journal ] Xiaolei Qian Distribution Design of Integrity Constraints. [Citation Graph (3, 0)][DBLP ] Expert Database Conf., 1988, pp:205-226 [Conf ] Xiaolei Qian , Louiqa Raschid Query Interoperation Among Object-Oriented and Relational Databases. [Citation Graph (3, 15)][DBLP ] ICDE, 1995, pp:271-278 [Conf ] Marianne Winslett , Kenneth Smith , Xiaolei Qian Formal Query Languages for Secure Relational Databases. [Citation Graph (3, 23)][DBLP ] ACM Trans. Database Syst., 1994, v:19, n:4, pp:626-662 [Journal ] Xiaolei Qian On the Expressive Power of the Bounded Iteration Construct. [Citation Graph (2, 8)][DBLP ] DBPL, 1989, pp:411-421 [Conf ] Thomas D. Garvey , Teresa F. Lunt , Xiaolei Qian , Mark E. Stickel Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. [Citation Graph (2, 0)][DBLP ] DBSec, 1992, pp:149-168 [Conf ] Xiaolei Qian A Model-Theoretic Semantics of the Multilevel Relational Model. [Citation Graph (1, 8)][DBLP ] EDBT, 1994, pp:201-214 [Conf ] Xiaolei Qian Correct Schema Transformations. [Citation Graph (1, 16)][DBLP ] EDBT, 1996, pp:114-128 [Conf ] Xiaolei Qian , Gio Wiederhold Data Definition Facilities of Critias. [Citation Graph (1, 19)][DBLP ] ER, 1985, pp:46-55 [Conf ] Xiaolei Qian , Teresa F. Lunt A MAC Policy Framework for Multilevel Relational Databases. [Citation Graph (1, 15)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:3-15 [Journal ] Xiaolei Qian , Teresa F. Lunt A Semantic Framework of the Multilevel Secure Relational Model. [Citation Graph (1, 14)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:2, pp:292-301 [Journal ] Xiaolei Qian The Deductive Synthesis of Database Transactions. [Citation Graph (1, 24)][DBLP ] ACM Trans. Database Syst., 1993, v:18, n:4, pp:626-677 [Journal ] Xiaolei Qian , Teresa F. Lunt Towards a MAC Policy Framework. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:165-180 [Conf ] Xiaolei Qian Semantic Interoperation Via Intelligent Mediation. [Citation Graph (0, 0)][DBLP ] RIDE-IMS, 1993, pp:228-231 [Conf ] José Meseguer , Xiaolei Qian A Logical Semantics for Object-Oriented Databases. [Citation Graph (0, 22)][DBLP ] SIGMOD Conference, 1993, pp:89-98 [Conf ] Mark Moriconi , Xiaolei Qian Correctness and Composition of Software Architectures. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 1994, pp:164-174 [Conf ] Simon N. Foley , Li Gong , Xiaolei Qian A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:142-153 [Conf ] Mark Moriconi , Xiaolei Qian , Robert A. Riemenschneider , Li Gong Secure Software Architectures. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:84-93 [Conf ] Xiaolei Qian View-Based Access Control with High Assurance. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:85-93 [Conf ] Xiaolei Qian Synthesizing Database Transactions. [Citation Graph (0, 9)][DBLP ] VLDB, 1990, pp:552-565 [Conf ] Gio Wiederhold , Xiaolei Qian Consistency Control of Replicated Data in Federated Databases. [Citation Graph (0, 0)][DBLP ] Workshop on the Management of Replicated Data, 1990, pp:130-132 [Conf ] Xiaolei Qian , Allen Goldberg Referential Opacity In Nondeterministic Data Refinement. [Citation Graph (0, 0)][DBLP ] LOPLAS, 1993, v:2, n:1-4, pp:233-241 [Journal ] Xiaolei Qian Jumping on the NII Bandwagon. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1994, v:23, n:3, pp:61-65 [Journal ] Xiaolei Qian Announcements from NSF, NASA, and Elsewhere. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1994, v:23, n:4, pp:104-107 [Journal ] Xiaolei Qian Political Winds Change Direction Again. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1995, v:24, n:1, pp:100-105 [Journal ] Xiaolei Qian Turmoil at NASA, and Numerous Funding Announcements. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1995, v:24, n:3, pp:83-90 [Journal ] Xiaolei Qian Opportunities at ARPA, NSF, and Elsewhere [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1995, v:24, n:4, pp:90-93 [Journal ] Xiaolei Qian Shutdown, Budget, and Funding. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1996, v:25, n:1, pp:119-122 [Journal ] Xiaolei Qian Scientist's Called Upon to Take Actions. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1996, v:25, n:3, pp:77-80 [Journal ] Xiaolei Qian New Programs at DARPA and NSF. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1996, v:25, n:4, pp:94-98 [Journal ] Xiaolei Qian Opportunities in Information Management and Assurance. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1997, v:26, n:1, pp:82-84 [Journal ] Li Gong , Xiaolei Qian Enriching the Expressive Power of Security Labels. [Citation Graph (0, 3)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:839-841 [Journal ] Li Gong , Xiaolei Qian Computational Issues in Secure Interoperation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:1, pp:43-52 [Journal ] Mark Moriconi , Xiaolei Qian , Robert A. Riemenschneider Correct Architecture Refinement. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1995, v:21, n:4, pp:356-372 [Journal ] Search in 0.006secs, Finished in 0.009secs