Sciweavers

5578 search results - page 1001 / 1116
» Base Class Injection
Sort
View
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 9 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
ICFP
2005
ACM
14 years 9 months ago
A computational approach to reflective meta-reasoning about languages with bindings
We present a foundation for a computational meta-theory of languages with bindings implemented in a computer-aided formal reasoning environment. Our theory provides the ability to...
Aleksey Nogin, Alexei Kopylov, Xin Yu, Jason Hicke...
SOSP
2007
ACM
14 years 6 months ago
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
Software defects significantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most difficult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...
IPSN
2010
Springer
14 years 4 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...
IPSN
2010
Springer
14 years 4 months ago
Lakon: a middle-ground approach to high-frequency data acquisition and in-network processing in sensor networks
The need for high-frequency signal acquisition and processing is becoming increasingly prevalent in sensor networks. Applications that require high-frequency data sampling are pre...
Prashanth G. Reddy, Nigamanth Sridhar
« Prev « First page 1001 / 1116 Last » Next »