Sciweavers

6583 search results - page 1169 / 1317
» Semantic Analysis Patterns
Sort
View
IDTRUST
2010
ACM
15 years 10 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
143
Voted
POPL
2010
ACM
15 years 10 months ago
Ypnos: declarative, parallel structured grid programming
A fully automatic, compiler-driven approach to parallelisation can result in unpredictable time and space costs for compiled code. On the other hand, a fully manual approach to pa...
Dominic A. Orchard, Max Bolingbroke, Alan Mycroft
133
Voted
EDBTW
2010
Springer
15 years 10 months ago
Updating probabilistic XML
We investigate the complexity of performing updates on probabilistic XML data for various classes of probabilistic XML documents of different succinctness. We consider two elemen...
Evgeny Kharlamov, Werner Nutt, Pierre Senellart
ACSC
2009
IEEE
15 years 10 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
131
Voted
AOSD
2009
ACM
15 years 10 months ago
Expressive scoping of distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires proper means for scoping aspects. Scoping issues are particularly crucial in a distribu...
Éric Tanter, Johan Fabry, Rémi Douen...
« Prev « First page 1169 / 1317 Last » Next »