Sciweavers

1894 search results - page 333 / 379
» A TLA Proof System
Sort
View
141
Voted
ER
2008
Springer
110views Database» more  ER 2008»
15 years 5 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi
117
Voted
ESOP
2008
Springer
15 years 5 months ago
Typing Safe Deallocation
In this work we address the problem of proving, by static analysis means, that allocating and deallocating regions in the store provides a safe way to achieve memory management. Th...
Gérard Boudol
152
Voted
DBSEC
2008
196views Database» more  DBSEC 2008»
15 years 5 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
120
Voted
IJCAI
2007
15 years 5 months ago
Tractable Temporal Reasoning
Temporal reasoning is widely used within both Computer Science and A.I. However, the underlying complexity of temporal proof in discrete temporal logics has led to the use of simp...
Clare Dixon, Michael Fisher, Boris Konev
157
Voted
SEDE
2007
15 years 5 months ago
A framework for constraint checking involving aggregates for multiple XML databases using schematron
Many internet and enterprise applications now not only use XML (eXtensible Markup Language) as a medium for communication but also for storing their data either temporarily for an...
Albin Laga, Praveen Madiraju