Sciweavers

1712 search results - page 54 / 343
» Abstract Constraint Data Types
Sort
View
PPOPP
2009
ACM
15 years 11 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha
ADAEUROPE
2010
Springer
15 years 3 months ago
AdaStreams: A Type-Based Programming Extension for Stream-Parallelism with Ada 2005
Because multicore CPUs have become the standard with all major hardware manufacturers, it becomes increasingly important for ing languages to provide programming abstractions that ...
Gingun Hong, Kirak Hong, Bernd Burgstaller, Johann...
KES
2007
Springer
15 years 5 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
VLDB
1993
ACM
142views Database» more  VLDB 1993»
15 years 3 months ago
Collections of Objects in SQL3
SQL3generalizestherelationalmodelinto anobjectmodel abstract data types, multiple inheritance, and dynamic polymorphism. Tables may then contain collections (multisets) of objects...
David Beech
CP
2000
Springer
15 years 3 months ago
Automatic Generation of Propagation Rules for Finite Domains
plexity Theorems: Talk Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 David McAllester Regular Papers Automatic Generation of Propagation Rules for F...
Slim Abdennadher, Christophe Rigotti