Sciweavers

365 search results - page 51 / 73
» Extracting Business Rules from Source Code
Sort
View
POPL
2001
ACM
16 years 1 days ago
Oracle-based checking of untrusted software
We present a variant of Proof-Carrying Code (PCC) in which the trusted inference rules are represented as a higher-order logic program, the proof checker is replaced by a nondeter...
George C. Necula, Shree Prakash Rahul
92
Voted
SCAM
2002
IEEE
15 years 4 months ago
Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages
This paper concerns the use of static analysis for debugging purposes of declarative object-oriented equation-based modeling languages. We propose a framework where over- and unde...
Peter Bunus, Peter Fritzson
PKDD
2005
Springer
110views Data Mining» more  PKDD 2005»
15 years 5 months ago
k-Anonymous Patterns
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
ICWS
2007
IEEE
15 years 1 months ago
Model-driven Composition of Context-aware Web Services Using ContextUML and Aspects
Service Oriented Architectures (SOAs) are constantly gaining ground for the provision of business to business as well as user-centric services, mainly in the form of Web Services ...
George N. Prezerakos, Nikolaos D. Tselikas, Giovan...
ER
2004
Springer
246views Database» more  ER 2004»
15 years 5 months ago
Data Mapping Diagrams for Data Warehouse Design with UML
Abstract. In Data Warehouse (DW) scenarios, ETL (Extraction, Transformation, Loading) processes are responsible for the extraction of data from heterogeneous operational data sourc...
Sergio Luján-Mora, Panos Vassiliadis, Juan ...