Sciweavers

1004 search results - page 132 / 201
» Safe Constraint Queries
Sort
View
POPL
2012
ACM
12 years 4 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 3 months ago
Supporting Generic Cost Models for Wide-Area Stream Processing
— Existing stream processing systems are optimized for a specific metric, which may limit their applicability to diverse applications and environments. This paper presents XFlow...
Olga Papaemmanouil, Ugur Çetintemel, John J...
EDBT
2009
ACM
102views Database» more  EDBT 2009»
14 years 3 months ago
On keys, foreign keys and nullable attributes in relational mapping systems
We consider the following scenario for a mapping system: given a source schema, a target schema, and a set of value correspondences between these two schemas, generate an executab...
Luca Cabibbo
ICSM
2003
IEEE
14 years 2 months ago
Software Architecture Recovery based on Pattern Matching
This paper is a summary of the author’s thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined ar...
Kamran Sartipi
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
14 years 1 months ago
Computing label-constraint reachability in graph databases
Our world today is generating huge amounts of graph data such as social networks, biological networks, and the semantic web. Many of these real-world graphs are edge-labeled graph...
Ruoming Jin, Hui Hong, Haixun Wang, Ning Ruan, Yan...