Sciweavers

3639 search results - page 115 / 728
» Provenance as Dependency Analysis
Sort
View
CADE
2008
Springer
15 years 10 months ago
Engineering DPLL(T) + Saturation
Satisfiability Modulo Theories (SMT) solvers have proven highly scalable, efficient and suitable for integrated theory reasoning. The most efficient SMT solvers rely on refutationa...
Leonardo Mendonça de Moura, Nikolaj Bj&osla...
ESOP
2010
Springer
15 years 7 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
BPM
2009
Springer
145views Business» more  BPM 2009»
15 years 4 months ago
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes
The effect of using automated auditing tools to detect compliance failures in unmanaged business processes is investigated. In the absence of a process execution engine, compliance...
Yurdaer N. Doganata, Francisco Curbera
ICASSP
2008
IEEE
15 years 4 months ago
Auction-based resource allocation for multi-relay asynchronous cooperative networks
Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distr...
Jianwei Huang, Zhu Han, Mung Chiang, H. Vincent Po...
WADS
2007
Springer
82views Algorithms» more  WADS 2007»
15 years 4 months ago
On a Family of Strong Geometric Spanners That Admit Local Routing Strategies
We introduce a family of directed geometric graphs, denoted Gθ λ, that depend on two parameters λ and θ. For 0 ≤ θ < π 2 and 1 2 < λ < 1, the Gθ λ graph is a s...
Prosenjit Bose, Paz Carmi, Mathieu Couture, Michie...