Sciweavers

800 search results - page 66 / 160
» XML access control using static analysis
Sort
View
136
Voted
ARESEC
2011
119views more  ARESEC 2011»
14 years 3 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
ICSE
2010
IEEE-ACM
15 years 8 months ago
Views: object-inspired concurrency control
We present views, a new approach to controlling concurrency. Fine-grained locking is often necessary to increase concurrency. Correctly implementing fine-grained locking with tod...
Brian Demsky, Patrick Lam
175
Voted
ICFP
2012
ACM
13 years 6 months ago
Introspective pushdown analysis of higher-order programs
In the static analysis of functional programs, pushdown flow analabstract garbage collection skirt just inside the boundaries of soundness and decidability. Alone, each method re...
Christopher Earl, Ilya Sergey, Matthew Might, Davi...
145
Voted
EDBT
2010
ACM
189views Database» more  EDBT 2010»
15 years 8 months ago
Efficient physical operators for cost-based XPath execution
The creation of a generic and modular query optimization and processing infrastructure can provide significant benefits to XML data management. Key pieces of such an infrastructur...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...
135
Voted
BMCBI
2005
134views more  BMCBI 2005»
15 years 3 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...