Sciweavers

1077 search results - page 167 / 216
» Management of Evolving Specifications using Category Theory
Sort
View
CCS
2008
ACM
13 years 9 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
BCSHCI
2009
13 years 9 months ago
Measuring the influence of social abilities on acceptance of an interface robot and a screen agent by elderly users
Personal robots and screen agents can be equipped with social abilities to facilitate interaction. This paper describes our research on the influence of these abilities on elderly...
Marcel Heerink, Ben J. A. Kröse, Bob J. Wieli...
PODS
2010
ACM
242views Database» more  PODS 2010»
14 years 28 days ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak
SIGMOD
2009
ACM
258views Database» more  SIGMOD 2009»
14 years 8 months ago
Continuous obstructed nearest neighbor queries in spatial databases
In this paper, we study a novel form of continuous nearest neighbor queries in the presence of obstacles, namely continuous obstructed nearest neighbor (CONN) search. It considers...
Yunjun Gao, Baihua Zheng
EDBT
2010
ACM
177views Database» more  EDBT 2010»
14 years 2 months ago
Bridging the gap between intensional and extensional query evaluation in probabilistic databases
There are two broad approaches to query evaluation over probabilistic databases: (1) Intensional Methods proceed by manipulating expressions over symbolic events associated with u...
Abhay Jha, Dan Olteanu, Dan Suciu