Sciweavers

537 search results - page 28 / 108
» Problems from CGCS Luminy, May 2007
Sort
View
ICDT
2007
ACM
126views Database» more  ICDT 2007»
15 years 5 months ago
Containment of Conjunctive Queries over Databases with Null Values
Abstract. We study containment of conjunctive queries that are evaluated over databases that may contain tuples with null values. We assume the semantics of SQL for single block qu...
Carles Farré, Werner Nutt, Ernest Teniente,...
ICFEM
2007
Springer
15 years 5 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
AAAI
2007
15 years 1 months ago
Online Co-Localization in Indoor Wireless Networks by Dimension Reduction
This paper addresses the problem of recovering the locations of both mobile devices and access points from radio signals that come in a stream manner, a problem which we call onli...
Jeffrey Junfeng Pan, Qiang Yang, Sinno Jialin Pan
COLT
2007
Springer
15 years 5 months ago
Resource-Bounded Information Gathering for Correlation Clustering
We present a new class of problems, called resource-bounded information gathering for correlation clustering. Our goal is to perform correlation clustering under circumstances in w...
Pallika Kanani, Andrew McCallum
JSW
2007
123views more  JSW 2007»
14 years 11 months ago
A Taxonomy for a Constructive Approach to Software Evolution
Abstract— In many software design and evaluation techniques, either the software evolution problem is not systematically elaborated, or only the impact of evolution is considered...
Selim Ciraci, Pim van den Broek, Mehmet Aksit