Automating the Enterprise with Foundation Models

M Wornow, A Narayan, K Opsahl-Ong… - arXiv preprint arXiv …, 2024 - arxiv.org
Automating enterprise workflows could unlock $4 trillion/year in productivity gains. Despite
being of interest to the data management community for decades, the ultimate vision of end …

Type-level computations for Ruby libraries

M Kazerounian, SN Guria, N Vazou, JS Foster… - Proceedings of the 40th …, 2019 - dl.acm.org
Many researchers have explored ways to bring static typing to dynamic languages.
However, to date, such systems are not precise enough when types depend on values …

A deductive reasoning approach for database applications using verification conditions

MI Alam, R Halder, JS Pinto - Journal of Systems and Software, 2021 - Elsevier
Deductive verification has gained paramount attention from both academia and industry.
Although intensive research in this direction covers almost all mainstream languages, the …

Information flow analysis for valued-indexed data security compartments

L Lourenço, L Caires - International Symposium on Trustworthy Global …, 2013 - Springer
Data-intensive applications as popularised by cloud computing raise many security
challenges, due to the large number of remote users involved and multi-tenancy. Frequently …

Automatically detecting integrity violations in database-centric applications

B Li, D Poshyvanyk, M Grechanik - 2017 IEEE/ACM 25th …, 2017 - ieeexplore.ieee.org
Database-centric applications (DCAs) are widely used by many companies and
organizations to perform various control and analytical tasks using large databases. Real …

Adaptive peer to peer resource discovery in grid computing based on reinforcement learning

MAJ Jamali, Y Sani - 2011 12th ACIS International Conference …, 2011 - ieeexplore.ieee.org
Grid computing provides a distributed computing environment which supports high
performance and data intensive applications by enabling the sharing and selecting various …

[图书][B] Object-Oriented Technology

S Alagić - 2015 - Springer
The core idea of this book is that object-oriented technology is a generic technology whose
various technical aspects could be presented in a unified and consistent framework. This …

Verifiable object-oriented transactions

S Alagić, A Fazeli - Concurrent Objects and Beyond: Papers dedicated to …, 2014 - Springer
Unlike the existing object-oriented and other database technologies, database schemas in
the technology developed in this research are equipped with very general integrity …

Cryptographic verification by typing for a sample protocol implementation

C Fournet, K Bhargavan, AD Gordon - … of Security Analysis and Design VI …, 2011 - Springer
Type systems are effective tools for verifying the security of cryptographic protocols and
implementations. They provide automation, modularity and scalability, and have been …

Inconsistency-tolerant integrity checking based on inconsistency metrics

H Decker - International Conference on Knowledge-Based and …, 2011 - Springer
A large diversity of different approaches to integrity checking has been proposed in the
literature. We present a generic approach to integrity checking that is based on …