Sciweavers

4491 search results - page 399 / 899
» Algorithm Engineering
Sort
View
SIGMOD
2008
ACM
102views Database» more  SIGMOD 2008»
16 years 4 months ago
Stream firewalling of xml constraints
As XML-based messages have become common in many client-server protocols, there is a need to protect application servers from invalid or dangerous messages. This leads to the XML ...
Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild
SIGMOD
2007
ACM
190views Database» more  SIGMOD 2007»
16 years 4 months ago
XANADUE: a system for detecting changes to XML data in tree-unaware relational databases
Recently, a number of main memory algorithms for detecting the changes to XML data have been proposed. These approaches are not suitable for detecting changes to large XML documen...
Erwin Leonardi, Sourav S. Bhowmick
TACAS
2010
Springer
181views Algorithms» more  TACAS 2010»
15 years 11 months ago
Boom: Taking Boolean Program Model Checking One Step Further
Abstract. We present Boom, a comprehensive analysis tool for Boolean programs. We focus in this paper on model-checking non-recursive concurrent programs. Boom implements a recent ...
Gérard Basler, Matthew Hague, Daniel Kroeni...
IH
2007
Springer
15 years 10 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
WEBDB
2007
Springer
162views Database» more  WEBDB 2007»
15 years 10 months ago
Term Ranking for Clustering Web Search Results
Clustering web search engine results for ambiguous keyword searches poses unique challenges. First, we show that one cannot readily import the frequency based feature ranking to c...
Fatih Gelgi, Hasan Davulcu, Srinivas Vadrevu