Sciweavers

1963 search results - page 53 / 393
» Applications of Preferences using Answer Set Programming
Sort
View
119
Voted
CASCON
2004
108views Education» more  CASCON 2004»
15 years 4 months ago
Consistent query answering under inclusion dependencies
For several reasons a database may not satisfy certain integrity constraints (ICs), for example, when it is the result of integrating several independent data sources. However, mo...
Loreto Bravo, Leopoldo E. Bertossi
118
Voted
PLDI
2009
ACM
15 years 9 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
117
Voted
APSEC
2005
IEEE
15 years 8 months ago
An Integrated Solution for Testing and Analyzing Java Applications in an Industrial Setting
Testing a large-scale, real-life commercial software application is a very challenging task due to the constant changes in the software, the involvement of multiple programmers an...
W. Eric Wong, J. Jenny Li
153
Voted
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 7 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
130
Voted
CAV
2008
Springer
96views Hardware» more  CAV 2008»
15 years 4 months ago
Implied Set Closure and Its Application to Memory Consistency Verification
Hangal et. al. [3] have developed a procedure to check if an instance of the execution of a shared memory multiprocessor program, is consistent with the Total Store Order (TSO) mem...
Surender Baswana, Shashank K. Mehta, Vishal Powar