Sciweavers

461 search results - page 27 / 93
» Fundamentals of concern manipulation
Sort
View
HASKELL
2009
ACM
14 years 2 months ago
Alloy: fast generic transformations for Haskell
Data-type generic programming can be used to traverse and manipulate specific parts of large heterogeneously-typed tree structures, without the need for tedious boilerplate. Gene...
Neil C. C. Brown, Adam T. Sampson
IEEEIAS
2007
IEEE
14 years 1 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
ICDT
2007
ACM
90views Database» more  ICDT 2007»
14 years 1 months ago
On the Expressiveness of Implicit Provenance in Query and Update Languages
Abstract. Information concerning the origin of data (that is, its provenance) is important in many areas, especially scientific recordkeeping. Currently, provenance information mu...
Peter Buneman, James Cheney, Stijn Vansummeren
IEEECIT
2006
IEEE
14 years 1 months ago
A Novel Implementation of JPEG 2000 Lossless Coding Based on LZMA
Faced with drawbacks of JPEG 2000 lossless coding in network application as far as manipulation flexibility is concerned, this paper proposes a differential approach of implementa...
Zongjie Tu, Shiyong Zhang
DOCENG
2006
ACM
14 years 1 months ago
Mash-o-matic
Mash-ups extract data fragments from disparate sources, and combine and transform the extracted fragments for display. Currently, mash-up developers tend to employ ad hoc represen...
Sudarshan Murthy, David Maier, Lois M. L. Delcambr...