Sciweavers

1989 search results - page 175 / 398
» Set functions for functional logic programming
Sort
View
KBSE
2005
IEEE
15 years 9 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
132
Voted
PLDI
2010
ACM
16 years 24 days ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala
164
Voted
POPL
2010
ACM
16 years 24 days ago
Toward a Verified Relational Database Management System
We report on our experience implementing a lightweight, fully verified relational database management system (RDBMS). The functional specification of RDBMS behavior, RDBMS impleme...
Avraham Shinnar, Greg Morrisett, J. Gregory Malech...
163
Voted
OSDI
2004
ACM
16 years 3 months ago
MapReduce: Simplified Data Processing on Large Clusters
MapReduce is a programming model and an associated implementation for processing and generating large data sets. Users specify a map function that processes a key/value pair to ge...
Jeffrey Dean, Sanjay Ghemawat
137
Voted
DMIN
2006
142views Data Mining» more  DMIN 2006»
15 years 4 months ago
Parallel Hybrid Clustering using Genetic Programming and Multi-Objective Fitness with Density (PYRAMID)
Clustering is the process of locating patterns in large data sets. It is an active research area that provides value to scientific as well as business applications. Practical clust...
Junping Sun, William Sverdlik, Samir Tout