Sciweavers

1358 search results - page 142 / 272
» An inductive database and query language in the relational m...
Sort
View
CCS
2001
ACM
15 years 2 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
SIGCOMM
2009
ACM
15 years 4 months ago
DECOR: DEClaritive network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundame...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
CCR
2010
131views more  CCR 2010»
14 years 10 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
LICS
1994
IEEE
15 years 2 months ago
Subtyping and Parametricity
In this paper we study the interaction of subtyping and parametricity. We describe a logic for a programming language with parametric polymorphism and subtyping. The logic support...
Gordon D. Plotkin, Martín Abadi, Luca Carde...
SIGMOD
2000
ACM
121views Database» more  SIGMOD 2000»
15 years 2 months ago
TIP: A Temporal Extension to Informix
Commercial relational database systems today provide only limited temporal support. To address the needs of applications requiring rich temporal data and queries, we have built TI...
Jun Yang 0001, Huacheng C. Ying, Jennifer Widom