Sciweavers

37 search results - page 4 / 8
» A machine-checked model of safe composition
Sort
View
VLDB
2012
ACM
360views Database» more  VLDB 2012»
12 years 2 months ago
An adaptive updating protocol for reducing moving object database workload
In the last decade, spatio-temporal database research focuses on the design of effective and efficient indexing structures in support of location-based queries such as predictive...
Su Chen, Beng Chin Ooi, Zhenjie Zhang
ECMDAFA
2010
Springer
241views Hardware» more  ECMDAFA 2010»
13 years 11 months ago
Detecting Inconsistencies in Multi-View Models with Variability
Multi-View Modeling (MVM) is a common modeling practice that advocates the use of multiple, different and yet related models to represent the needs of diverse stakeholders. Of cruc...
Roberto Erick Lopez-Herrejon, Alexander Egyed
DBISP2P
2003
Springer
76views Database» more  DBISP2P 2003»
14 years 6 days ago
Trust-Aware Delivery of Composite Goods
Abstract. The vast majority of the interactions in typical online communities nowadays is between complete strangers. In such settings reputation reporting and trust management mod...
Magdalena Punceva, Karl Aberer
CSFW
2006
IEEE
13 years 10 months ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
SIGSOFT
2007
ACM
14 years 7 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...