Sciweavers

949 search results - page 48 / 190
» Relating Imperatives to Action
Sort
View
ICDE
2004
IEEE
94views Database» more  ICDE 2004»
14 years 9 months ago
SQLCM: A Continuous Monitoring Framework for Relational Database Engines
The ability to monitor a database server is crucial for effective database administration. Today's commercial database systems support two basic mechanisms for monitoring: (a...
Arnd Christian König, Surajit Chaudhuri, Vive...
EUROCRYPT
2005
Springer
14 years 1 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller
ICFP
2008
ACM
14 years 7 months ago
NixOS: a purely functional Linux distribution
Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as upgrading packages or changes to system con...
Andres Löh, Eelco Dolstra
SECON
2007
IEEE
14 years 1 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
SPIN
2005
Springer
14 years 1 months ago
Repairing Structurally Complex Data
We present a novel algorithm for repairing structurally complex data. Given an assertion that represents desired structural integrity constraints and a structure that violates them...
Sarfraz Khurshid, Iván García, Yuk L...