Sciweavers

4272 search results - page 746 / 855
» A Case for Automatic System Evaluation
Sort
View
WWW
2005
ACM
15 years 10 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
ECOOP
2009
Springer
15 years 10 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
SAS
2009
Springer
171views Formal Methods» more  SAS 2009»
15 years 10 months ago
Bottom-Up Shape Analysis
In this paper we present a new shape analysis algorithm. The key distinguishing aspect of our algorithm is that it is completely compositional, bottom-up and non-iterative. We pres...
Bhargav S. Gulavani, Supratik Chakraborty, Ganesan...
SIGMOD
2007
ACM
134views Database» more  SIGMOD 2007»
15 years 10 months ago
Updating a cracked database
A cracked database is a datastore continuously reorganized based on operations being executed. For each query, the data of interest is physically reclustered to speed-up future ac...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
SIGMOD
2005
ACM
161views Database» more  SIGMOD 2005»
15 years 10 months ago
Efficient Keyword Search for Smallest LCAs in XML Databases
Keyword search is a proven, user-friendly way to query HTML documents in the World Wide Web. We propose keyword search in XML documents, modeled as labeled trees, and describe cor...
Yu Xu, Yannis Papakonstantinou