Sciweavers

7274 search results - page 135 / 1455
» Abstractions for network update
Sort
View
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
15 years 11 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...
AMAST
2004
Springer
15 years 10 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
ICCS
2004
Springer
15 years 10 months ago
A Note on Data-Driven Contaminant Simulation
Abstract. In this paper we introduce a numerical procedure for performing dynamic data driven simulations (DDDAS). The main ingredient of our simulation is the multiscale interpola...
Craig C. Douglas, Chad E. Shannon, Yalchin Efendie...
COOPIS
2003
IEEE
15 years 10 months ago
Flora-2: A Rule-Based Knowledge Representation and Inference Infrastructure for the Semantic Web
Abstract. Flora-2 is a rule-based object-oriented knowledge base system designed for a variety of automated tasks on the Semantic Web, ranging from meta-data management to informat...
Guizhen Yang, Michael Kifer, Chang Zhao
ICDT
2003
ACM
127views Database» more  ICDT 2003»
15 years 10 months ago
Incremental Validation of XML Documents
We investigate the incremental validation of XML documents with respect to DTDs and XML Schemas, under updates consisting of element tag renamings, insertions and deletions. DTDs ...
Yannis Papakonstantinou, Victor Vianu