Sciweavers

1223 search results - page 164 / 245
» An Attributive Logic of Set Descriptions and Set Operations
Sort
View
CCS
2011
ACM
13 years 12 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
PODS
2011
ACM
201views Database» more  PODS 2011»
14 years 2 months ago
Data exchange beyond complete data
In the traditional data exchange setting, source instances are restricted to be complete in the sense that every fact is either true or false in these instances. Although natural ...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...
ICFP
2006
ACM
15 years 12 months ago
Type-theoretic design patterns
The development of design patterns in object-oriented programming aims at capturing good software design in a re-usable generic form. However, design patterns are not expressible ...
Ondrej Rypacek, Roland Carl Backhouse, Henrik Nils...
HYBRID
2009
Springer
15 years 6 months ago
Optimization of Multi-agent Motion Programs with Applications to Robotic Marionettes
Abstract. In this paper, we consider the problem of generating optimized, executable control code from high-level, symbolic specifications. In particular, we construct symbolic co...
Patrick Martin, Magnus Egerstedt
CIBSE
2009
ACM
15 years 6 months ago
A Service-Oriented Approach for Model Management
In the Software Engineering (SE) domain, the Model Driven Engineering (MDE)1 paradigm focuses on using models as main software artifacts to provide a full description of software s...
Jorge Luis Pérez-Medina, Dominique Rieu, So...