Sciweavers

1557 search results - page 117 / 312
» Programming up to Congruence
Sort
View
ACSAC
2005
IEEE
15 years 4 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
WWW
2005
ACM
15 years 4 months ago
Incremental maintenance for materialized XPath/XSLT views
This paper proposes an incremental maintenance algorithm that efficiently updates the materialized XPath/XSLT views defined using XPath expressions in XP{[],∗,//,vars} . The al...
Makoto Onizuka, Fong Yee Chan, Ryusuke Michigami, ...
EDO
2005
Springer
15 years 4 months ago
A middleware-independent model and language for component distribution
A distribution model for the new generation of component languages, which allows to plug required into provided interfaces, is presented together with the distributed component la...
Hans Albrecht Schmid, Marco Pfeifer, Thorsten Schn...
SSD
2005
Springer
188views Database» more  SSD 2005»
15 years 4 months ago
Capacity Constrained Routing Algorithms for Evacuation Planning: A Summary of Results
Abstract. Evacuation planning is critical for numerous important applications, e.g. disaster emergency management and homeland defense preparation. Efficient tools are needed to pr...
Qingsong Lu, Betsy George, Shashi Shekhar
TACAS
2005
Springer
155views Algorithms» more  TACAS 2005»
15 years 4 months ago
Context-Bounded Model Checking of Concurrent Software
The interaction among concurrently executing threads of a program results in insidious programming errors that are difficult to reproduce and fix. Unfortunately, the problem of ve...
Shaz Qadeer, Jakob Rehof