Sciweavers

2338 search results - page 121 / 468
» Using UML to model relational database operations
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 5 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
JUCS
2010
134views more  JUCS 2010»
14 years 11 months ago
Systematic Management of Variability in UML-based Software Product Lines
Abstract: This paper presents SMarty, a variability management approach for UMLbased software product lines (PL). SMarty is supported by a UML profile, the SMartyProfile, and a pro...
Edson Alves de Oliveira Junior, Itana Maria de Sou...
LICS
2009
IEEE
15 years 11 months ago
Logical Step-Indexed Logical Relations
We show how to reason about “step-indexed” logitions in an abstract way, avoiding the tedious, error-prone, and proof-obscuring step-index arithmetic that seems superficially...
Derek Dreyer, Amal Ahmed, Lars Birkedal
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
15 years 10 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
ACL
2009
15 years 2 months ago
Distant supervision for relation extraction without labeled data
Modern models of relation extraction for tasks like ACE are based on supervised learning of relations from small hand-labeled corpora. We investigate an alternative paradigm that ...
Mike Mintz, Steven Bills, Rion Snow, Daniel Jurafs...