Sciweavers

POPL
2011
ACM
14 years 6 months ago
Blame for all
Amal Ahmed, Robert Bruce Findler, Jeremy G. Siek, ...
171
Voted
POPL
2011
ACM
14 years 6 months ago
Pick your contexts well: understanding object-sensitivity
ensitivity has emerged as an excellent context abstraction for points-to analysis in object-oriented languages. Despite its practical success, however, object-sensitivity is poorl...
Yannis Smaragdakis, Martin Bravenboer, Ondrej Lhot...
POPL
2011
ACM
14 years 6 months ago
Correct blame for contracts: no more scapegoating
Christos Dimoulas, Robert Bruce Findler, Cormac Fl...
151
Voted
POPL
2011
ACM
14 years 6 months ago
Dynamic inference of static types for ruby
There have been several efforts to bring static type inference to object-oriented dynamic languages such as Ruby, Python, and Perl. In our experience, however, such type inference...
Jong-hoon (David) An, Avik Chaudhuri, Jeffrey S. F...
PODS
2011
ACM
165views Database» more  PODS 2011»
14 years 6 months ago
Tight bounds for Lp samplers, finding duplicates in streams, and related problems
Hossein Jowhari, Mert Saglam, Gábor Tardos
217
Voted
PODS
2011
ACM
238views Database» more  PODS 2011»
14 years 6 months ago
Beyond simple aggregates: indexing for summary queries
Database queries can be broadly classified into two categories: reporting queries and aggregation queries. The former retrieves a collection of records from the database that mat...
Zhewei Wei, Ke Yi
180
Voted
PODS
2011
ACM
220views Database» more  PODS 2011»
14 years 6 months ago
Maximizing conjunctive views in deletion propagation
In deletion propagation, tuples from the database are deleted in order to reflect the deletion of a tuple from the view. Such an operation may result in the (often necessary) del...
Benny Kimelfeld, Jan Vondrák, Ryan Williams
167
Voted
PODS
2011
ACM
201views Database» more  PODS 2011»
14 years 6 months ago
Data exchange beyond complete data
In the traditional data exchange setting, source instances are restricted to be complete in the sense that every fact is either true or false in these instances. Although natural ...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 6 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
PODS
2011
ACM
229views Database» more  PODS 2011»
14 years 6 months ago
On the complexity of privacy-preserving complex event processing
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...