Sciweavers

69 search results - page 7 / 14
» Enforcing Design Constraints with Object Logic
Sort
View
BTW
2007
Springer
121views Database» more  BTW 2007»
14 years 1 months ago
Algorithms for merged indexes
B-tree and index into two layers of abstraction. In addition, this paper provides algorithms for (i) concurrency control and recovery including locking of individual keys and of co...
Goetz Graefe
ASPLOS
2011
ACM
12 years 11 months ago
NV-Heaps: making persistent objects fast and safe with next-generation, non-volatile memories
nt, user-defined objects present an attractive abstraction for working with non-volatile program state. However, the slow speed of persistent storage (i.e., disk) has restricted ...
Joel Coburn, Adrian M. Caulfield, Ameen Akel, Laur...
JUCS
2010
152views more  JUCS 2010»
13 years 2 months ago
Verification of Structural Pattern Conformance Using Logic Programming
: This paper formalizes UML class diagrams and structural patterns as mathematical objects and provides a precise notion of conformance of a structural model specified as a class d...
Lunjin Lu, Dae-Kyoo Kim, Yuanlin Zhu, Sangsig Kim
WSCG
2004
151views more  WSCG 2004»
13 years 9 months ago
Inserting G1 Discontinuities into Free-form Features for Aesthetic Design
Free form shapes are often used to fulfil both aesthetic and design constraints applied to parametric models currently adopted in CAD environments. Up to now, designers and engine...
Vincent Cheutet, Jean-Philippe Pernot, Jean-Claude...
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu