Sciweavers

1893 search results - page 48 / 379
» Computational composites
Sort
View
ICDT
2010
ACM
180views Database» more  ICDT 2010»
15 years 8 months ago
Composing local-as-view mappings: closure and applications
Schema mapping composition is a fundamental operation in schema management and data exchange. The mapping composition problem has been extensively studied for a number of mapping ...
Patricia C. Arocena, Ariel Fuxman, Renée J....
ICDT
2010
ACM
163views Database» more  ICDT 2010»
15 years 3 months ago
Composing Local-As-View Mappings
Schema mapping composition is a fundamental operation in schema management and data exchange. The mapping composition problem has been extensively studied for a number of mapping ...
Patricia Arocena, Ariel Fuxman, Renee Miller
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 5 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
APSCC
2008
IEEE
15 years 11 months ago
Towards Service Supervision for Public Web Services
Public Web services are not designed to be used with specific other Web services in a composite Web service. This leads to the following requirements for the proper control of a ...
Masahiro Tanaka, Yohei Murakami, Toru Ishida
JOC
2007
84views more  JOC 2007»
15 years 4 months ago
Concurrent Composition of Secure Protocols in the Timing Model
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it ha...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...