The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaolei Qian: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaolei Qian, Gio Wiederhold
    Incremental Recomputation of Active Relational Expressions. [Citation Graph (30, 15)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1991, v:3, n:3, pp:337-341 [Journal]
  2. Xiaolei Qian
    Query Folding. [Citation Graph (16, 13)][DBLP]
    ICDE, 1996, pp:48-55 [Conf]
  3. Xiaolei Qian, Gio Wiederhold
    Knowledge-based Integrity Constraint Validation. [Citation Graph (12, 10)][DBLP]
    VLDB, 1986, pp:3-12 [Conf]
  4. Xiaolei Qian, Douglas R. Smith
    Integrity Constraint Reformulation for Efficient Validation. [Citation Graph (10, 17)][DBLP]
    VLDB, 1987, pp:417-425 [Conf]
  5. Xiaolei Qian
    An Effective Method for Integrity Constraint Simplification. [Citation Graph (9, 17)][DBLP]
    ICDE, 1988, pp:338-345 [Conf]
  6. Gio Wiederhold, Xiaolei Qian
    Modeling Asynchrony in Distributed Databases. [Citation Graph (9, 15)][DBLP]
    ICDE, 1987, pp:246-250 [Conf]
  7. Xiaolei Qian, Richard J. Waldinger
    A Transaction Logic for Database Specification. [Citation Graph (7, 15)][DBLP]
    SIGMOD Conference, 1988, pp:243-250 [Conf]
  8. Xiaolei Qian
    An Axiom System for Database Transactions. [Citation Graph (7, 0)][DBLP]
    Inf. Process. Lett., 1990, v:36, n:4, pp:183-189 [Journal]
  9. H. V. Jagadish, Xiaolei Qian
    Integrity Maintenance in Object-Oriented Databases. [Citation Graph (6, 26)][DBLP]
    VLDB, 1992, pp:469-480 [Conf]
  10. Xiaolei Qian, Teresa F. Lunt
    Tuple-level vs Element-level Classification. [Citation Graph (4, 0)][DBLP]
    DBSec, 1992, pp:301-316 [Conf]
  11. Xiaolei Qian
    The Expressive Power of the Bounded-Iteration Construct. [Citation Graph (4, 0)][DBLP]
    Acta Inf., 1991, v:28, n:7, pp:631-656 [Journal]
  12. Xiaolei Qian
    Distribution Design of Integrity Constraints. [Citation Graph (3, 0)][DBLP]
    Expert Database Conf., 1988, pp:205-226 [Conf]
  13. Xiaolei Qian, Louiqa Raschid
    Query Interoperation Among Object-Oriented and Relational Databases. [Citation Graph (3, 15)][DBLP]
    ICDE, 1995, pp:271-278 [Conf]
  14. Marianne Winslett, Kenneth Smith, Xiaolei Qian
    Formal Query Languages for Secure Relational Databases. [Citation Graph (3, 23)][DBLP]
    ACM Trans. Database Syst., 1994, v:19, n:4, pp:626-662 [Journal]
  15. Xiaolei Qian
    On the Expressive Power of the Bounded Iteration Construct. [Citation Graph (2, 8)][DBLP]
    DBPL, 1989, pp:411-421 [Conf]
  16. Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel
    Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. [Citation Graph (2, 0)][DBLP]
    DBSec, 1992, pp:149-168 [Conf]
  17. Xiaolei Qian
    A Model-Theoretic Semantics of the Multilevel Relational Model. [Citation Graph (1, 8)][DBLP]
    EDBT, 1994, pp:201-214 [Conf]
  18. Xiaolei Qian
    Correct Schema Transformations. [Citation Graph (1, 16)][DBLP]
    EDBT, 1996, pp:114-128 [Conf]
  19. Xiaolei Qian, Gio Wiederhold
    Data Definition Facilities of Critias. [Citation Graph (1, 19)][DBLP]
    ER, 1985, pp:46-55 [Conf]
  20. Xiaolei Qian, Teresa F. Lunt
    A MAC Policy Framework for Multilevel Relational Databases. [Citation Graph (1, 15)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:3-15 [Journal]
  21. Xiaolei Qian, Teresa F. Lunt
    A Semantic Framework of the Multilevel Secure Relational Model. [Citation Graph (1, 14)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:2, pp:292-301 [Journal]
  22. Xiaolei Qian
    The Deductive Synthesis of Database Transactions. [Citation Graph (1, 24)][DBLP]
    ACM Trans. Database Syst., 1993, v:18, n:4, pp:626-677 [Journal]
  23. Xiaolei Qian, Teresa F. Lunt
    Towards a MAC Policy Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:165-180 [Conf]
  24. Xiaolei Qian
    Semantic Interoperation Via Intelligent Mediation. [Citation Graph (0, 0)][DBLP]
    RIDE-IMS, 1993, pp:228-231 [Conf]
  25. José Meseguer, Xiaolei Qian
    A Logical Semantics for Object-Oriented Databases. [Citation Graph (0, 22)][DBLP]
    SIGMOD Conference, 1993, pp:89-98 [Conf]
  26. Mark Moriconi, Xiaolei Qian
    Correctness and Composition of Software Architectures. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1994, pp:164-174 [Conf]
  27. Simon N. Foley, Li Gong, Xiaolei Qian
    A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:142-153 [Conf]
  28. Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong
    Secure Software Architectures. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:84-93 [Conf]
  29. Xiaolei Qian
    View-Based Access Control with High Assurance. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:85-93 [Conf]
  30. Xiaolei Qian
    Synthesizing Database Transactions. [Citation Graph (0, 9)][DBLP]
    VLDB, 1990, pp:552-565 [Conf]
  31. Gio Wiederhold, Xiaolei Qian
    Consistency Control of Replicated Data in Federated Databases. [Citation Graph (0, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1990, pp:130-132 [Conf]
  32. Xiaolei Qian, Allen Goldberg
    Referential Opacity In Nondeterministic Data Refinement. [Citation Graph (0, 0)][DBLP]
    LOPLAS, 1993, v:2, n:1-4, pp:233-241 [Journal]
  33. Xiaolei Qian
    Jumping on the NII Bandwagon. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1994, v:23, n:3, pp:61-65 [Journal]
  34. Xiaolei Qian
    Announcements from NSF, NASA, and Elsewhere. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1994, v:23, n:4, pp:104-107 [Journal]
  35. Xiaolei Qian
    Political Winds Change Direction Again. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1995, v:24, n:1, pp:100-105 [Journal]
  36. Xiaolei Qian
    Turmoil at NASA, and Numerous Funding Announcements. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1995, v:24, n:3, pp:83-90 [Journal]
  37. Xiaolei Qian
    Opportunities at ARPA, NSF, and Elsewhere [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1995, v:24, n:4, pp:90-93 [Journal]
  38. Xiaolei Qian
    Shutdown, Budget, and Funding. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1996, v:25, n:1, pp:119-122 [Journal]
  39. Xiaolei Qian
    Scientist's Called Upon to Take Actions. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1996, v:25, n:3, pp:77-80 [Journal]
  40. Xiaolei Qian
    New Programs at DARPA and NSF. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1996, v:25, n:4, pp:94-98 [Journal]
  41. Xiaolei Qian
    Opportunities in Information Management and Assurance. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1997, v:26, n:1, pp:82-84 [Journal]
  42. Li Gong, Xiaolei Qian
    Enriching the Expressive Power of Security Labels. [Citation Graph (0, 3)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:839-841 [Journal]
  43. Li Gong, Xiaolei Qian
    Computational Issues in Secure Interoperation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:43-52 [Journal]
  44. Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider
    Correct Architecture Refinement. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1995, v:21, n:4, pp:356-372 [Journal]

Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002