Sciweavers

750 search results - page 103 / 150
» Desires, Norms and Constraints
Sort
View
POPL
2004
ACM
16 years 4 days ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
SIGMOD
2008
ACM
65views Database» more  SIGMOD 2008»
15 years 12 months ago
Generating targeted queries for database testing
Tools for generating test queries for databases do not explicitly take into account the actual data in the database. As a consequence, such tools cannot guarantee suitable coverag...
Chaitanya Mishra, Nick Koudas, Calisto Zuzarte
SIGMOD
2002
ACM
129views Database» more  SIGMOD 2002»
15 years 12 months ago
Best-effort cache synchronization with source cooperation
In environments where exact synchronization between source data objects and cached copies is not achievable due to bandwidth or other resource constraints, stale (out-of-date) cop...
Chris Olston, Jennifer Widom
MOBIHOC
2007
ACM
15 years 11 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
DCC
2008
IEEE
15 years 11 months ago
Server Placement in Multiple-Description-Based Media Streaming
Multiple description coding (MDC) has emerged as a powerful technique for reliable real-time communications over lossy packet networks. In its basic form, it involves encoding a me...
Satyajeet Ahuja, Marwan Krunz