Sciweavers

23201 search results - page 110 / 4641
» Rewriting Systems with Data
Sort
View
130
Voted
DSN
2005
IEEE
15 years 11 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
VLDB
2004
ACM
101views Database» more  VLDB 2004»
15 years 10 months ago
Taming XPath Queries by Minimizing Wildcard Steps
This paper presents a novel and complementary technique to optimize an XPath query by minimizing its wildcard steps. Our approach is based on using a general composite axis called...
Chee Yong Chan, Wenfei Fan, Yiming Zeng
AGTIVE
2007
Springer
15 years 11 months ago
A Single-Step Term-Graph Reduction System for Proof Assistants
In this paper, we will define a custom term-graph reduction system for a simplified lazy functional language. Our custom system is geared towards flexibility, which is accomplis...
Maarten de Mol, Marko C. J. D. van Eekelen, Rinus ...
ICDE
2003
IEEE
122views Database» more  ICDE 2003»
16 years 6 months ago
XML Publishing: Look at Siblings too!
In order to publish a nested XML document from flat relational data, multiple SQL queries are often needed. The efficiency of publishing relies on how fast these queries can be ev...
Sihem Amer-Yahia, Yannis Kotidis, Divesh Srivastav...
POPL
2002
ACM
16 years 5 months ago
Proving correctness of compiler optimizations by temporal logic
Many classical compiler optimizations can be elegantly expressed using rewrite rules of form: I = I if , where I, I are intermediate language instructions and is a property expre...
David Lacey, Neil D. Jones, Eric Van Wyk, Carl Chr...