Sciweavers

7694 search results - page 1359 / 1539
» An Implementation of an Applicative File System
Sort
View
211
Voted
VLDB
2007
ACM
225views Database» more  VLDB 2007»
16 years 4 months ago
An Approach to Optimize Data Processing in Business Processes
In order to optimize their revenues and profits, an increasing number of businesses organize their business activities in terms of business processes. Typically, they automate imp...
Marko Vrhovnik, Holger Schwarz, Oliver Suhre, Bern...
159
Voted
SIGMOD
2004
ACM
95views Database» more  SIGMOD 2004»
16 years 4 months ago
Querying at Internet-Scale
We are developing a distributed query processor called PIER, which is designed to run on the scale of the entire Internet. PIER utilizes a Distributed Hash Table (DHT) as its comm...
Brent N. Chun, Joseph M. Hellerstein, Ryan Huebsch...
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 4 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
122
Voted
ICSE
2004
IEEE-ACM
16 years 4 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
125
Voted
ICFP
2003
ACM
16 years 3 months ago
Scripting the type inference process
To improve the quality of type error messages in functional programming languages, we propose four techniques which influence the behaviour of constraint-based type inference proc...
Bastiaan Heeren, Jurriaan Hage, S. Doaitse Swierst...
« Prev « First page 1359 / 1539 Last » Next »