Sciweavers

2432 search results - page 391 / 487
» Cryptographic logical relations
Sort
View
ER
2010
Springer
164views Database» more  ER 2010»
15 years 2 months ago
Querying Databases with Taxonomies
Traditional information search in which queries are posed against a known and rigid schema over a structured database is shifting towards a Web scenario in which exposed schemas ar...
Davide Martinenghi, Riccardo Torlone
ER
2010
Springer
129views Database» more  ER 2010»
15 years 2 months ago
SQOWL: Type Inference in an RDBMS
In this paper we describe a method to perform type inference over data stored in an RDBMS, where rules over the data are specified using OWLDL. Since OWL-DL is an implementation of...
Peter McBrien, Nikos Rizopoulos, Andrew Smith
JSC
2010
100views more  JSC 2010»
14 years 11 months ago
An invariant-based approach to the verification of asynchronous parameterized networks
A uniform verification problem for parameterized systems is to determine whether a temporal property is satisfied for every instance of the system which is composed of an arbitrar...
Igor V. Konnov, Vladimir A. Zakharov
CAV
2012
Springer
222views Hardware» more  CAV 2012»
13 years 6 months ago
Leveraging Interpolant Strength in Model Checking
Craig interpolation is a well known method of abstraction successfully used in both hardware and software model checking. The logical strength of interpolants can affect the quali...
Simone Fulvio Rollini, Ondrej Sery, Natasha Sharyg...
ICDT
2009
ACM
175views Database» more  ICDT 2009»
16 years 5 months ago
Structural characterizations of schema-mapping languages
Schema mappings are declarative specifications that describe the relationship between two database schemas. In recent years, there has been an extensive study of schema mappings a...
Balder ten Cate, Phokion G. Kolaitis