Sciweavers

1644 search results - page 249 / 329
» Finding Dominators in Practice
Sort
View
PODS
2010
ACM
197views Database» more  PODS 2010»
13 years 8 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
CCS
2010
ACM
13 years 8 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
SIGCSE
2010
ACM
203views Education» more  SIGCSE 2010»
13 years 8 months ago
An approach to integrating ICTD projects into an undergraduate curriculum
Applying information and communication technologies to development (ICTD) is emerging as an interesting and motivating research area in computer science and engineering. It spans ...
Richard J. Anderson, Ruth E. Anderson, Gaetano Bor...
SIGIR
2010
ACM
13 years 8 months ago
Has portfolio theory got any principles?
Recently, Portfolio Theory (PT) has been proposed for Information Retrieval. However, under non-trivial conditions PT violates the original Probability Ranking Principle (PRP). In...
Guido Zuccon, Leif Azzopardi, Keith van Rijsbergen
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
13 years 8 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...