default search action
Xiaolei Qian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1997
- [j20]Xiaolei Qian:
Opportunities in Information Management and Assurance. SIGMOD Rec. 26(1): 82-84 (1997) - [j19]Xiaolei Qian, Teresa F. Lunt:
A Semantic Framework of the Multilevel Secure Relational Model. IEEE Trans. Knowl. Data Eng. 9(2): 292-301 (1997) - [c28]Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong:
Secure Software Architectures. S&P 1997: 84-93 - 1996
- [j18]Xiaolei Qian:
Shutdown, Budget, and Funding. SIGMOD Rec. 25(1): 119-122 (1996) - [j17]Xiaolei Qian:
Scientist's Called Upon to Take Actions. SIGMOD Rec. 25(3): 77-80 (1996) - [j16]Xiaolei Qian:
New Programs at DARPA and NSF. SIGMOD Rec. 25(4): 94-98 (1996) - [j15]Xiaolei Qian, Teresa F. Lunt:
A MAC Policy Framework for Multilevel Relational Databases. IEEE Trans. Knowl. Data Eng. 8(1): 3-15 (1996) - [j14]Li Gong, Xiaolei Qian:
Computational Issues in Secure Interoperation. IEEE Trans. Software Eng. 22(1): 43-52 (1996) - [c27]Xiaolei Qian:
Correct Schema Transformations. EDBT 1996: 114-128 - [c26]Xiaolei Qian:
Query Folding. ICDE 1996: 48-55 - [c25]Xiaolei Qian:
View-Based Access Control with High Assurance. S&P 1996: 85-93 - [c24]Simon N. Foley, Li Gong, Xiaolei Qian:
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. S&P 1996: 142-153 - 1995
- [j13]Xiaolei Qian:
Political Winds Change Direction Again. SIGMOD Rec. 24(1): 100-105 (1995) - [j12]Xiaolei Qian:
Turmoil at NASA, and Numerous Funding Announcements. SIGMOD Rec. 24(3): 83-90 (1995) - [j11]Xiaolei Qian:
Opportunities at ARPA, NSF, and Elsewhere. SIGMOD Rec. 24(4): 90-93 (1995) - [j10]Li Gong, Xiaolei Qian:
Enriching the Expressive Power of Security Labels. IEEE Trans. Knowl. Data Eng. 7(5): 839-841 (1995) - [j9]Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider:
Correct Architecture Refinement. IEEE Trans. Software Eng. 21(4): 356-372 (1995) - [c23]Xiaolei Qian, Teresa F. Lunt:
Towards a MAC Policy Framework. DBSec 1995: 165-180 - [c22]Xiaolei Qian, Louiqa Raschid:
Query Interoperation Among Object-Oriented and Relational Databases. ICDE 1995: 271-278 - 1994
- [j8]Xiaolei Qian:
Jumping on the NII Bandwagon. SIGMOD Rec. 23(3): 61-65 (1994) - [j7]Xiaolei Qian:
Announcements from NSF, NASA, and Elsewhere. SIGMOD Rec. 23(4): 104-107 (1994) - [j6]Marianne Winslett, Kenneth P. Smith, Xiaolei Qian:
Formal Query Languages for Secure Relational Databases. ACM Trans. Database Syst. 19(4): 626-662 (1994) - [c21]Xiaolei Qian:
A Model-Theoretic Semantics of the Multilevel Relational Model. EDBT 1994: 201-214 - [c20]Mark Moriconi, Xiaolei Qian:
Correctness and Composition of Software Architectures. SIGSOFT FSE 1994: 164-174 - [c19]Xiaolei Qian:
Inference channel-free integrity constraints in multilevel relational databases. S&P 1994: 158-167 - [c18]Li Gong, Xiaolei Qian:
The complexity and composability of secure interoperation. S&P 1994: 190-200 - 1993
- [j5]Xiaolei Qian, Allen Goldberg:
Referential Opacity In Nondeterministic Data Refinement. LOPLAS 2(1-4): 233-241 (1993) - [j4]Xiaolei Qian:
The Deductive Synthesis of Database Transactions. ACM Trans. Database Syst. 18(4): 626-677 (1993) - [c17]Xiaolei Qian:
Semantic Interoperation Via Intelligent Mediation. RIDE-IMS 1993: 228-231 - [c16]José Meseguer, Xiaolei Qian:
A Logical Semantics for Object-Oriented Databases. SIGMOD Conference 1993: 89-98 - [c15]Xiaolei Qian, Mark E. Stickel, Peter D. Karp, Teresa F. Lunt, Thomas D. Garvey:
Detection and elimination of inference channels in multilevel relational database systems. S&P 1993: 196-205 - 1992
- [c14]Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel:
Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. DBSec 1992: 149-168 - [c13]Xiaolei Qian, Teresa F. Lunt:
Tuple-level vs Element-level Classification. DBSec 1992: 301-316 - [c12]H. V. Jagadish, Xiaolei Qian:
Integrity Maintenance in Object-Oriented Databases. VLDB 1992: 469-480 - 1991
- [j3]Xiaolei Qian:
The Expressive Power of the Bounded-Iteration Construct. Acta Informatica 28(7): 631-656 (1991) - [j2]Xiaolei Qian, Gio Wiederhold:
Incremental Recomputation of Active Relational Expressions. IEEE Trans. Knowl. Data Eng. 3(3): 337-341 (1991) - 1990
- [j1]Xiaolei Qian:
An Axiom System for Database Transactions. Inf. Process. Lett. 36(4): 183-189 (1990) - [c11]Xiaolei Qian, Richard Jüllig, Marilyn Daum:
Consistency management in a project management assistant. SDE 1990: 34-43 - [c10]Xiaolei Qian:
Synthesizing Database Transactions. VLDB 1990: 552-565 - [c9]Gio Wiederhold, Xiaolei Qian:
Consistency Control of Replicated Data in Federated Databases. Workshop on the Management of Replicated Data 1990: 130-132
1980 – 1989
- 1989
- [b1]Xiaolei Qian:
The deductive synthesis of database transactions. Stanford University, USA, 1989 - [c8]Xiaolei Qian:
On the Expressive Power of the Bounded Iteration Construct. DBPL 1989: 411-421 - 1988
- [c7]Xiaolei Qian:
Distribution Design of Integrity Constraints. Expert Database Conf. 1988: 205-226 - [c6]Xiaolei Qian:
An Effective Method for Integrity Constraint Simplification. ICDE 1988: 338-345 - [c5]Xiaolei Qian, Richard J. Waldinger:
A Transaction Logic for Database Specification. SIGMOD Conference 1988: 243-250 - 1987
- [c4]Gio Wiederhold, Xiaolei Qian:
Modeling Asynchrony in Distributed Databases. ICDE 1987: 246-250 - [c3]Xiaolei Qian, Douglas R. Smith:
Integrity Constraint Reformulation for Efficient Validation. VLDB 1987: 417-425 - 1986
- [c2]Xiaolei Qian, Gio Wiederhold:
Knowledge-based Integrity Constraint Validation. VLDB 1986: 3-12 - 1985
- [c1]Xiaolei Qian, Gio Wiederhold:
Data Definition Facilities of Critias. ER 1985: 46-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint