Sciweavers

103 search results - page 14 / 21
» Checking Violation Tolerance of Approaches to Database Integ...
Sort
View
VLDB
2001
ACM
108views Database» more  VLDB 2001»
13 years 12 months ago
Potter's Wheel: An Interactive Data Cleaning System
Cleaning data of errors in structure and content is important for data warehousing and integration. Current solutions for data cleaning involve many iterations of data “auditing...
Vijayshankar Raman, Joseph M. Hellerstein
DASFAA
2007
IEEE
266views Database» more  DASFAA 2007»
14 years 1 months ago
Compatibility Analysis and Mediation-Aided Composition for BPEL Services
In Service Oriented Architecture (SOA), the need for inter-service compatibility analysis has gone beyond what existing service composition/ verification approaches can handle. Giv...
Wei Tan, Fangyan Rao, Yushun Fan, Jun Zhu
ACSAC
2009
IEEE
14 years 2 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen
ISSTA
2000
ACM
13 years 12 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
CIKM
2004
Springer
14 years 28 days ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu