Sciweavers

1111 search results - page 163 / 223
» A Conceptual Modeling Technique Based on Semantically Comple...
Sort
View
POPL
2012
ACM
12 years 4 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
ICCD
2006
IEEE
115views Hardware» more  ICCD 2006»
14 years 5 months ago
Long-term Performance Bottleneck Analysis and Prediction
— Identifying performance bottlenecks is important for microarchitects and application developers to produce high performance microprocessor designs and application software. Man...
Fei Gao, Suleyman Sair
BMCBI
2008
121views more  BMCBI 2008»
13 years 9 months ago
Modularization of biochemical networks based on classification of Petri net t-invariants
Background: Structural analysis of biochemical networks is a growing field in bioinformatics and systems biology. The availability of an increasing amount of biological data from ...
Eva Grafahrend-Belau, Falk Schreiber, Monika Heine...
POPL
2006
ACM
14 years 9 months ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 6 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...