Sciweavers

686 search results - page 106 / 138
» Nonmonotonic inference operations
Sort
View
ISSAC
2004
Springer
185views Mathematics» more  ISSAC 2004»
14 years 3 months ago
Automatic generation of polynomial loop
In [17], an abstract framework for automatically generating loop invariants of imperative programs was proposed. This framework was then instantiated for the language of conjuncti...
Enric Rodríguez-Carbonell, Deepak Kapur
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 3 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik
NDSS
2003
IEEE
14 years 3 months ago
Detecting Service Violations and DoS Attacks
Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the reso...
Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava
SIGMETRICS
2010
ACM
160views Hardware» more  SIGMETRICS 2010»
14 years 2 months ago
RSIO: automatic user interaction detection and scheduling
We present RSIO, a processor scheduling framework for improving the response time of latency-sensitive applications by monitoring accesses to I/O channels and inferring when user ...
Haoqiang Zheng, Jason Nieh
SEMWEB
2009
Springer
14 years 2 months ago
Reasoning With Provenance, Trust and all that other Meta Knowlege in OWL
Abstract—For many tasks, such as the integration of knowledge bases in the semantic web, one must not only handle the knowledge itself, but also characterizations of this knowled...
Simon Schenk, Renata Queiroz Dividino, Steffen Sta...