Sciweavers

1941 search results - page 272 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
222
Voted
ICDT
2009
ACM
175views Database» more  ICDT 2009»
16 years 4 months ago
Structural characterizations of schema-mapping languages
Schema mappings are declarative specifications that describe the relationship between two database schemas. In recent years, there has been an extensive study of schema mappings a...
Balder ten Cate, Phokion G. Kolaitis
125
Voted
SIGSOFT
2004
ACM
16 years 4 months ago
Efficient incremental algorithms for dynamic detection of likely invariants
Dynamic detection of likely invariants is a program analysis that generalizes over observed values to hypothesize program properties. The reported program properties are a set of ...
Jeff H. Perkins, Michael D. Ernst
POPL
2005
ACM
16 years 4 months ago
Automated soundness proofs for dataflow analyses and transformations via local rules
We present Rhodium, a new language for writing compiler optimizations that can be automatically proved sound. Unlike our previous work on Cobalt, Rhodium expresses optimizations u...
Sorin Lerner, Todd D. Millstein, Erika Rice, Craig...
PODS
2005
ACM
99views Database» more  PODS 2005»
16 years 3 months ago
XML type checking with macro tree transducers
MSO logic on unranked trees has been identified as a convenient theoretical framework for reasoning about expressiveness and implementations of practical XML query languages. As a...
Sebastian Maneth, Alexandru Berlea, Thomas Perst, ...
133
Voted
KBSE
2005
IEEE
15 years 9 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard