Automating the Enterprise with Foundation Models
Automating enterprise workflows could unlock $4 trillion/year in productivity gains. Despite
being of interest to the data management community for decades, the ultimate vision of end …
being of interest to the data management community for decades, the ultimate vision of end …
Type-level computations for Ruby libraries
Many researchers have explored ways to bring static typing to dynamic languages.
However, to date, such systems are not precise enough when types depend on values …
However, to date, such systems are not precise enough when types depend on values …
A deductive reasoning approach for database applications using verification conditions
Deductive verification has gained paramount attention from both academia and industry.
Although intensive research in this direction covers almost all mainstream languages, the …
Although intensive research in this direction covers almost all mainstream languages, the …
Information flow analysis for valued-indexed data security compartments
L Lourenço, L Caires - International Symposium on Trustworthy Global …, 2013 - Springer
Data-intensive applications as popularised by cloud computing raise many security
challenges, due to the large number of remote users involved and multi-tenancy. Frequently …
challenges, due to the large number of remote users involved and multi-tenancy. Frequently …
Automatically detecting integrity violations in database-centric applications
B Li, D Poshyvanyk, M Grechanik - 2017 IEEE/ACM 25th …, 2017 - ieeexplore.ieee.org
Database-centric applications (DCAs) are widely used by many companies and
organizations to perform various control and analytical tasks using large databases. Real …
organizations to perform various control and analytical tasks using large databases. Real …
Adaptive peer to peer resource discovery in grid computing based on reinforcement learning
MAJ Jamali, Y Sani - 2011 12th ACIS International Conference …, 2011 - ieeexplore.ieee.org
Grid computing provides a distributed computing environment which supports high
performance and data intensive applications by enabling the sharing and selecting various …
performance and data intensive applications by enabling the sharing and selecting various …
[图书][B] Object-Oriented Technology
S Alagić - 2015 - Springer
The core idea of this book is that object-oriented technology is a generic technology whose
various technical aspects could be presented in a unified and consistent framework. This …
various technical aspects could be presented in a unified and consistent framework. This …
Verifiable object-oriented transactions
S Alagić, A Fazeli - Concurrent Objects and Beyond: Papers dedicated to …, 2014 - Springer
Unlike the existing object-oriented and other database technologies, database schemas in
the technology developed in this research are equipped with very general integrity …
the technology developed in this research are equipped with very general integrity …
Cryptographic verification by typing for a sample protocol implementation
Type systems are effective tools for verifying the security of cryptographic protocols and
implementations. They provide automation, modularity and scalability, and have been …
implementations. They provide automation, modularity and scalability, and have been …
Inconsistency-tolerant integrity checking based on inconsistency metrics
H Decker - International Conference on Knowledge-Based and …, 2011 - Springer
A large diversity of different approaches to integrity checking has been proposed in the
literature. We present a generic approach to integrity checking that is based on …
literature. We present a generic approach to integrity checking that is based on …