Keyphrases
All-to-all
37%
All-to-all Communication
50%
Alltoallv
50%
Android Permissions
33%
Bottom-up Evaluation
25%
Communication-avoiding
50%
Content Provisioning Cost
50%
CTL*
20%
Data Load
25%
Datalog Programs
50%
Declassification Policy
50%
Definitional Interpreters
25%
Distributed Cooperative
50%
Dynamic Information Flow Control
50%
Electronic Book Readers
16%
End-consumer
16%
Fine-grained Authorization
50%
Flix
50%
Hash Join
33%
Heap Abstraction
25%
Heterogeneous Objects
16%
Higher-order Programs
25%
HyperLTL
20%
Hyperproperties
50%
Incremental Evaluation
50%
Incremental Update
25%
Linguistic Paradigm
25%
MPI Collectives
50%
MPI-Alltoall
37%
Multiple Versions
25%
Network Pricing
16%
Object Caching
33%
Program Comprehension
25%
Program Debugging
25%
Program Logic
25%
Program Maintenance
25%
Recursive Aggregates
50%
Relational Algebra
20%
Reverse Engineering Tools
33%
Runtime Checking
25%
Security Labels
50%
Security Type System
25%
Selfish Users
16%
Sensitive Resource
37%
Social Wireless Networks
50%
Souffles
50%
Source Code Comments
25%
Static Mechanism
25%
Telephony
16%
User Permission
50%
Computer Science
Access Control Policies
25%
Analyze Phase
10%
Android
100%
Android Application
50%
Average Message Size
50%
Bytecode
25%
Datalog
50%
Deductive Database
10%
Defined Data Type
25%
Developer Tool
10%
Electronic Book
33%
Functional Dependency
50%
Incremental Evaluation
50%
Information Flow Control
50%
Interactive Access
16%
Mental Representation
10%
Mobile App
25%
Mobile Platform
25%
Model Checking Algorithm
25%
Multiple Version
25%
Network Pricing
16%
Open Addressing
16%
Powerset
25%
Program Comprehension
25%
Provider Network
16%
Relational Algebra
20%
Security Condition
25%
Sensitive Informations
25%
Symbolic Execution
50%
System Authorization
12%
User Interaction
25%