Sciweavers

1588 search results - page 199 / 318
» On the Logic of Constitutive Rules
Sort
View
APSCC
2010
IEEE
14 years 11 months ago
Personalized Modeling for SaaS Based on Extended WSCL
Software as a service (SaaS) is an emerging software framework in which business data and logic typically integrate with other applications. It requires a unified subscriber to des...
Liu Ying, Zhang Bin, Liu Guoqi, Wang Deshuai, Gao ...
TKDE
2010
149views more  TKDE 2010»
14 years 8 months ago
A Configurable Rete-OO Engine for Reasoning with Different Types of Imperfect Information
The RETE algorithm is a very efficient option for the development of a rule-based system, but it supports only boolean, first order logic. Many real-world contexts, instead, requir...
Davide Sottara, Paola Mello, Mark Proctor
CSFW
2011
IEEE
14 years 1 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
CINQ
2004
Springer
189views Database» more  CINQ 2004»
15 years 7 months ago
Employing Inductive Databases in Concrete Applications
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
PODS
2008
ACM
152views Database» more  PODS 2008»
16 years 1 months ago
Towards a theory of schema-mapping optimization
A schema mapping is a high-level specification that describes the relationship between two database schemas. As schema mappings constitute the essential building blocks of data ex...
Ronald Fagin, Phokion G. Kolaitis, Alan Nash, Luci...