Sciweavers

7456 search results - page 1316 / 1492
» Parallelism in Logic Programming
Sort
View
139
Voted
PODS
2002
ACM
138views Database» more  PODS 2002»
16 years 3 months ago
Fast Algorithms For Hierarchical Range Histogram Construction
Data Warehousing and OLAPapplications typically view data as having multiple logical dimensions e.g., product, location with natural hierarchies de ned on each dimension. OLAP que...
Sudipto Guha, Nick Koudas, Divesh Srivastava
PODS
2005
ACM
99views Database» more  PODS 2005»
16 years 3 months ago
XML type checking with macro tree transducers
MSO logic on unranked trees has been identified as a convenient theoretical framework for reasoning about expressiveness and implementations of practical XML query languages. As a...
Sebastian Maneth, Alexandru Berlea, Thomas Perst, ...
133
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
110
Voted
NDSS
2009
IEEE
15 years 10 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
ATAL
2009
Springer
15 years 10 months ago
Combining fault injection and model checking to verify fault tolerance in multi-agent systems
The ability to guarantee that a system will continue to operate correctly under degraded conditions is key to the success of adopting multi-agent systems (MAS) as a paradigm for d...
Jonathan Ezekiel, Alessio Lomuscio
« Prev « First page 1316 / 1492 Last » Next »