Sciweavers

2704 search results - page 538 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
CCS
2008
ACM
13 years 8 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
JWSR
2007
172views more  JWSR 2007»
13 years 6 months ago
Service Class Driven Dynamic Data Source Discovery with DynaBot
: Dynamic Web data sources – sometimes known collectively as the Deep Web – increase the utility of the Web by providing intuitive access to data repositories anywhere that Web...
Daniel Rocco, James Caverlee, Ling Liu, Terence Cr...
PODS
2004
ACM
158views Database» more  PODS 2004»
14 years 6 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
14 years 1 months ago
Framework for Establishing Enterprise Modeling in the Context of Collaborative Enterprises
Increased market dynamics, shorter product lifecycles and a higher customer involvement in product design have caused great changes to competitive conditions and many companies ar...
Thomas Knothe, Timo Kahl, Dieter Boell, Kristof Sc...
PPOPP
2006
ACM
14 years 20 days ago
On-line automated performance diagnosis on thousands of processes
Performance analysis tools are critical for the effective use of large parallel computing resources, but existing tools have failed to address three problems that limit their scal...
Philip C. Roth, Barton P. Miller