Sciweavers

1004 search results - page 67 / 201
» Safe Constraint Queries
Sort
View
WWW
2005
ACM
14 years 9 months ago
Web service interfaces
We present a language for specifying web service interfaces. A web service interface puts three kinds of constraints on the users of the service. First, the interface specifies th...
Dirk Beyer, Arindam Chakrabarti, Thomas A. Henzing...
JCSS
2000
71views more  JCSS 2000»
13 years 8 months ago
Path Constraints in Semistructured Databases
We investigate a class of path constraints that is of interest in connection with both semistructured and structured data. In standard database systems, constraints are typically ...
Peter Buneman, Wenfei Fan, Scott Weinstein
ICRA
2006
IEEE
99views Robotics» more  ICRA 2006»
14 years 3 months ago
A Whole-body Control Framework for Humanoids Operating in Human Environments
Abstract— Tomorrow’s humanoids will operate in human environments, where efficient manipulation and locomotion skills, and safe contact interactions will be critical design fa...
Luis Sentis, Oussama Khatib
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 10 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
SAC
2010
ACM
13 years 9 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit