Sciweavers

104 search results - page 20 / 21
» A grey-box approach to automated mechanism design
Sort
View
ICFP
2009
ACM
14 years 6 months ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...
ICWS
2004
IEEE
13 years 6 months ago
External Matching in UDDI
As the set of available Web Services expands, it becomes increasingly important to have automated tools to help identify services that match a requester's requirements. Findi...
John Colgrave, Rama Akkiraju, Richard Goodwin
ER
2004
Springer
169views Database» more  ER 2004»
13 years 10 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
SIGMOD
2008
ACM
101views Database» more  SIGMOD 2008»
14 years 5 months ago
Pay-as-you-go user feedback for dataspace systems
A primary challenge to large-scale data integration is creating semantic equivalences between elements from different data sources that correspond to the same real-world entity or...
Shawn R. Jeffery, Michael J. Franklin, Alon Y. Hal...
CMS
2006
13 years 6 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis