Sciweavers

8177 search results - page 1519 / 1636
» Detecting System Emulators
Sort
View
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
16 years 3 months ago
Adaptive location constraint processing
An important problem for many location-based applications is the continuous evaluation of proximity relations among moving objects. These relations express whether a given set of ...
Zhengdao Xu, Hans-Arno Jacobsen
SIGMOD
2007
ACM
121views Database» more  SIGMOD 2007»
16 years 3 months ago
Execution strategies for SQL subqueries
Optimizing SQL subqueries has been an active area in database research and the database industry throughout the last decades. Previous work has already identified some approaches ...
César A. Galindo-Legaria, Milind Joshi, Mos...
116
Voted
ICFP
2006
ACM
16 years 3 months ago
Static typing for a faulty lambda calculus
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to change state. These faults do not cause permanent damage, but may result in incorr...
David Walker, Lester W. Mackey, Jay Ligatti, Georg...
140
Voted
SOSP
2009
ACM
16 years 10 days ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
WWW
2010
ACM
15 years 10 months ago
DSNotify: handling broken links in the web of data
The Web of Data has emerged as a way of exposing structured linked data on the Web. It builds on the central building blocks of the Web (URIs, HTTP) and benefits from its simplic...
Niko Popitsch, Bernhard Haslhofer
« Prev « First page 1519 / 1636 Last » Next »