Sciweavers

3604 search results - page 629 / 721
» All Common Subsequences
Sort
View
ICDT
2005
ACM
124views Database» more  ICDT 2005»
15 years 5 months ago
Optimal Distributed Declustering Using Replication
A common technique for improving performance for database query retrieval is to decluster the database among multiple disks so that retrievals can be parallelized. In this paper we...
Keith B. Frikken
ICFEM
2005
Springer
15 years 5 months ago
An Evidential Tool Bus
Abstract. Theorem provers, model checkers, static analyzers, test generators. . . all of these and many other kinds of formal methods tools can contribute to the analysis and devel...
John M. Rushby
OOPSLA
2005
Springer
15 years 5 months ago
Relational queries over program traces
Instrumenting programs with code to monitor runtime behavior is a common technique for profiling and debugging. In practice, instrumentation is either inserted manually by progra...
Simon Goldsmith, Robert O'Callahan, Alexander Aike...
RAID
2005
Springer
15 years 5 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
RSFDGRC
2005
Springer
111views Data Mining» more  RSFDGRC 2005»
15 years 5 months ago
Knowledge Discovery Based Query Answering in Hierarchical Information Systems
The paper concerns failing queries in incomplete Distributed Autonomous Information Systems (DAIS) based on attributes which are hierarchical and which semantics at different site...
Zbigniew W. Ras, Agnieszka Dardzinska, Osman G&uum...