Sciweavers

4397 search results - page 583 / 880
» Relational Algebra Operations
Sort
View
KBSE
1997
IEEE
15 years 8 months ago
Application of Formal Methods to the Development of a Software Maintenance Tool
Partial evaluation is an optimization technique traditionally used in compilation. We have adapted this technique to the understanding of scientic application programs during t...
Sandrine Blazy, Philippe Facon
INFOCOM
1996
IEEE
15 years 8 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
FM
1997
Springer
174views Formal Methods» more  FM 1997»
15 years 8 months ago
A Proof Obligation Generator for VDM-SL
In this paper an extension of the IFAD VDM-SL Toolbox with a proof obligation generator is described. Static type checking in VDM is undecidable in general and therefore the type c...
Bernhard K. Aichernig, Peter Gorm Larsen
ICDE
1993
IEEE
104views Database» more  ICDE 1993»
15 years 8 months ago
Deterministic Semantics of Set-Oriented Update Sequences
An iterator is proposed that allows to apply sequences of update operations in a set-oriented way with deterministic semantics. Because the mechanism is independent of a particula...
Christian Laasch, Marc H. Scholl
SSDBM
1994
IEEE
108views Database» more  SSDBM 1994»
15 years 8 months ago
Comparative Multivariate Visualization Across Conceptually Different Graphic Displays
To extend the scope of multivariate data visualization, the notion of comparative visualization is introduced: it allows the comparison of visualization methods by interconnecting...
Claudia Schmid, Hans Hinterberger