Sciweavers

229 search results - page 26 / 46
» A General Name Binding Mechanism
Sort
View
MIDDLEWARE
2007
Springer
14 years 4 months ago
CAESAR: middleware for complex service-oriented peer-to-peer applications
Recent research advances in Peer-to-Peer (P2P) computing have enabled the P2P paradigm to be used for developing complex applications beyond file sharing and data storage. These ...
Lipo Chan, Shanika Karunasekera, Aaron Harwood, Eg...
WWW
2007
ACM
14 years 10 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
SDMW
2004
Springer
14 years 3 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
JETAI
2000
121views more  JETAI 2000»
13 years 9 months ago
Contextual reasoning distilled
In this paper we provide a foundation of a theory of contextual reasoning from the perspective of a theory of knowledge representation. Starting from the so-called metaphor of the...
Massimo Benerecetti, Paolo Bouquet, Chiara Ghidini
POPL
2012
ACM
12 years 5 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka