Sciweavers

416 search results - page 71 / 84
» Intellectual Property and Open Systems
Sort
View
CIKM
2009
Springer
13 years 10 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang
SODA
2010
ACM
160views Algorithms» more  SODA 2010»
14 years 4 months ago
Solving Simple Stochastic Tail Games
Stochastic games are a natural model for open reactive processes: one player represents the controller and his opponent represents a hostile environment. The evolution of the syste...
Hugo Gimbert, Florian Horn
CIMCA
2008
IEEE
14 years 1 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
ICDT
2007
ACM
97views Database» more  ICDT 2007»
14 years 1 months ago
Combining Temporal Logics for Querying XML Documents
Close relationships between XML navigation and temporal logics have been discovered recently, in particular between logics LTL and CTL⋆ and XPath navigation, and between the µ-c...
Marcelo Arenas, Pablo Barceló, Leonid Libki...
IH
2004
Springer
14 years 23 days ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn