Sciweavers

2861 search results - page 382 / 573
» Constraint Programming
Sort
View
100
Voted
SIGSOFT
2008
ACM
16 years 3 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ICDE
2010
IEEE
221views Database» more  ICDE 2010»
15 years 2 months ago
A generic auto-provisioning framework for cloud databases
— We discuss the problem of resource provisioning for database management systems operating on top of an Infrastructure-As-A-Service (IaaS) cloud. To solve this problem, we descr...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
120
Voted
ICDT
2010
ACM
141views Database» more  ICDT 2010»
15 years 6 months ago
The Complexity of Rooted Phylogeny problems
Several computational problems in phylogenetic reconstruction can be formulated as restrictions of the following general problem: given a formula in conjunctive normal form where ...
Manuel Bodirsky, Jens K. Mueller
ECOOP
2004
Springer
15 years 8 months ago
Ownership Domains: Separating Aliasing Policy from Mechanism
Ownership types promise to provide a practical mechanism for enforcing stronger encapsulation by controlling aliasing in objectoriented languages. However, previous ownership type ...
Jonathan Aldrich, Craig Chambers
95
Voted
IEAAIE
1999
Springer
15 years 6 months ago
The Design of a Multi-tiered Bus Timetabling System
This paper describes the design of the Bus Timetabling System (BTS) we have developed for one of the largest privately held bus companies in the world. This Bus Company operates cl...
Andy Hon Wai Chun, Steve Ho Chuen Chan