Sciweavers

413 search results - page 63 / 83
» A formalism for functionality preserving system level transf...
Sort
View
ICFP
2008
ACM
14 years 7 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
CMSB
2006
Springer
13 years 11 months ago
Type Inference in Systems Biology
Type checking and type inference are important concepts and methods of programming languages and software engineering. Type checking is a way to ensure some level of consistency, d...
François Fages, Sylvain Soliman
SIGSOFT
2010
ACM
13 years 5 months ago
Separation of concerns for dependable software design
For `mixed-criticality' systems that have both critical and non-critical functions, the greatest leverage on dependability may be at the design level. By designing so that ea...
Daniel Jackson, Eunsuk Kang
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
14 years 2 months ago
Contract as a Source of Trust--Commitment in Successful IT Outsourcing Relationship: An Empirical Study
Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored...
Jahyun Goo, Kichan Nam
ESWS
2008
Springer
13 years 9 months ago
Building a National Semantic Web Ontology and Ontology Service Infrastructure -The FinnONTO Approach
Abstract. This paper presents the vision and results of creating a national level cross-domain ontology and ontology service infrastructure in Finland. The novelty of the infrastru...
Eero Hyvönen, Kim Viljanen, Jouni Tuominen, K...