Sciweavers

1941 search results - page 356 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
SIGMOD
1995
ACM
116views Database» more  SIGMOD 1995»
15 years 3 months ago
Incremental Maintenance of Views with Duplicates
We study the problem of e cient maintenance of materialized views that may contain duplicates. This problem is particularly important when queries against such views involve aggre...
Timothy Griffin, Leonid Libkin
SIGSOFT
2009
ACM
16 years 17 days ago
Static data race detection for concurrent programs with asynchronous calls
A large number of industrial concurrent programs are being designed based on a model which combines threads with event-based communication. These programs consist of several threa...
Vineet Kahlon, Nishant Sinha, Erik Kruus, Yun Zhan...
OTM
2007
Springer
15 years 6 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
AFRICACRYPT
2010
Springer
15 years 3 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
BNCOD
2004
131views Database» more  BNCOD 2004»
15 years 1 months ago
Teaching SQL - Which Pedagogical Horse for This Course?
A student with a Computing Science degree is expected to have reached a reasonable level of expertise in SQL. SQL is a non-trivial skill to master and is taught with different degr...
Karen Renaud, Judy van Biljon