Sciweavers

204 search results - page 34 / 41
» Tool support for working with sets of source code entities
Sort
View
VLDB
2007
ACM
128views Database» more  VLDB 2007»
14 years 7 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
COMPSAC
1998
IEEE
13 years 11 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
APLAS
2010
ACM
13 years 7 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
CBSE
2004
Springer
14 years 26 days ago
Correct Components Assembly for a Product Data Management Cooperative System
In this paper we report on a case study of correct automatic assembly of software components. We show the application of our tool (called Synthesis) for correct components assembly...
Massimo Tivoli, Paola Inverardi, Valentina Presutt...
BMCBI
2010
84views more  BMCBI 2010»
13 years 7 months ago
Word add-in for ontology recognition: semantic enrichment of scientific literature
Background: In the current era of scientific research, efficient communication of information is paramount. As such, the nature of scholarly and scientific communication is changi...
J. Lynn Fink, Pablo Fernicola, Rahul Chandran, Sav...