Sciweavers

229 search results - page 24 / 46
» A General Name Binding Mechanism
Sort
View
SIGCOMM
2012
ACM
12 years 9 days ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
ECOOP
1993
Springer
14 years 1 months ago
Nested Mixin-Methods in Agora
: Mixin-based inheritance is an inheritance technique that has been shown to subsume a variety of different inheritance mechanisms. It is based directly upon an incremental modific...
Patrick Steyaert, Wim Codenie, Theo D'Hondt, Koen ...
FSTTCS
2006
Springer
14 years 1 months ago
The Meaning of Ordered SOS
Structured Operational Semantics (SOS) is a popular method for defining semantics by means of deduction rules. An important feature of deduction rules, or simply SOS rules, are neg...
Mohammad Reza Mousavi, Iain C. C. Phillips, Michel...
ACSAC
2006
IEEE
14 years 3 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
CL
2010
Springer
13 years 10 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr