Sciweavers

1679 search results - page 47 / 336
» Pointcuts as Functional Queries
Sort
View
107
Voted
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 6 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
168
Voted
APPROX
2011
Springer
284views Algorithms» more  APPROX 2011»
14 years 22 days ago
On Approximating the Number of Relevant Variables in a Function
In this work we consider the problem of approximating the number of relevant variables in a function given query access to the function. Since obtaining a multiplicative factor ap...
Dana Ron, Gilad Tsur
86
Voted
ER
2004
Springer
84views Database» more  ER 2004»
15 years 6 months ago
Modeling Functional Data Sources as Relations
In this paper we present a model of functional access to data that, we argue, is suitable for modeling a class of data repositories characterized by functional access, such as web ...
Simone Santini, Amarnath Gupta
VLDB
2007
ACM
104views Database» more  VLDB 2007»
16 years 29 days ago
Inverse Functions in the AquaLogic Data Services Platform
When integrating data from heterogeneous sources, it is often necessary to transform both the schemas and the data from the underlying sources in order to present the integrated d...
Nicola Onose, Vinayak R. Borkar, Michael J. Carey
114
Voted
APLAS
2011
ACM
14 years 22 days ago
Solving Recursion-Free Horn Clauses over LI+UIF
Verification of programs with procedures, multi-threaded programs, and higher-order functional programs can be effectively auusing abstraction and refinement schemes that rely o...
Ashutosh Gupta, Corneliu Popeea, Andrey Rybalchenk...