Sciweavers

2797 search results - page 264 / 560
» Code query by example
Sort
View
TII
2010
166views Education» more  TII 2010»
14 years 10 months ago
Source-to-Source Architecture Transformation for Performance Optimization in BIP
Behavior, Interaction, Priorities (BIP) is a component framework for constructing systems from a set of atomic components by using two kinds of composition operators: interactions ...
Marius Bozga, Mohamad Jaber, Joseph Sifakis
USS
2008
15 years 6 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
237
Voted
SIGMOD
2008
ACM
169views Database» more  SIGMOD 2008»
16 years 4 months ago
MCDB: a monte carlo approach to managing uncertain data
To deal with data uncertainty, existing probabilistic database systems augment tuples with attribute-level or tuple-level probability values, which are loaded into the database al...
Ravi Jampani, Fei Xu, Mingxi Wu, Luis Leopoldo Per...
146
Voted
ICDT
2005
ACM
128views Database» more  ICDT 2005»
15 years 9 months ago
The Pipelined Set Cover Problem
Abstract. A classical problem in query optimization is to find the optimal ordering of a set of possibly correlated selections. We provide an ion of this problem as a generalizati...
Kamesh Munagala, Shivnath Babu, Rajeev Motwani, Je...
COOPIS
2003
IEEE
15 years 9 months ago
Static Type-Inference for Trust in Distributed Information Systems
Abstract. Decision-makers in critical fields such as medicine and finance make use of a wide range of information available over the Internet. Mediation, a data integration techn...
Premkumar T. Devanbu, Michael Gertz, Brian Toone