Sciweavers

3305 search results - page 127 / 661
» Can we Rely on SQL
Sort
View
SAT
2009
Springer
95views Hardware» more  SAT 2009»
14 years 4 months ago
Finding Lean Induced Cycles in Binary Hypercubes
Induced (chord-free) cycles in binary hypercubes have many applications in computer science. The state of the art for computing such cycles relies on genetic algorithms, which are,...
Yury Chebiryak, Thomas Wahl, Daniel Kroening, Leop...
PARA
1998
Springer
14 years 2 months ago
Exploiting Visualization and Direct Manipulation to Make Parallel Tools More Communicative
Parallel tools rely on graphical techniques to improve the quality of user interaction. In this paper, we explore how visualization and direct manipulation can be exploited in para...
Cherri M. Pancake
INFOCOM
2007
IEEE
14 years 4 months ago
On the Stability-Scalability Tradeoff of DHT Deployment
— Distributed hash tables (DHTs) provide efficient data naming and location with simple hash-table-like primitives, upon which sophisticated distributed applications can be buil...
Chih-Chiang Wang, Khaled Harfoush
ICALP
2001
Springer
14 years 2 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
AMAST
2008
Springer
14 years 8 days ago
Explaining Verification Conditions
The Hoare approach to program verification relies on the construction and discharge of verification conditions (VCs) but offers no support to trace, analyze, and understand the VCs...
Ewen Denney, Bernd Fischer 0002