Sciweavers

1683 search results - page 51 / 337
» A Needed Narrowing Strategy
Sort
View
SIGSOFT
2003
ACM
14 years 9 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
SIGMOD
2007
ACM
121views Database» more  SIGMOD 2007»
14 years 8 months ago
Execution strategies for SQL subqueries
Optimizing SQL subqueries has been an active area in database research and the database industry throughout the last decades. Previous work has already identified some approaches ...
César A. Galindo-Legaria, Milind Joshi, Mos...
HPDC
2006
IEEE
14 years 2 months ago
Exploring I/O Strategies for Parallel Sequence-Search Tools with S3aSim
Parallel sequence-search tools are rising in popularity among computational biologists. With the rapid growth of sequence databases, database segmentation is the trend of the futu...
Avery Ching, Wu-chun Feng, Heshan Lin, Xiaosong Ma...
CCS
2000
ACM
14 years 10 days ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 8 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani