Sciweavers

1995 search results - page 295 / 399
» Belief in Information Flow
Sort
View
IJNSEC
2008
83views more  IJNSEC 2008»
13 years 10 months ago
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
In this paper we present a novel dynamic verification approach to protect the local host confidentiality from malicious Java mobile code. In our approach we use Bytecode Modificat...
Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru ...
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 10 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
JUCS
2008
120views more  JUCS 2008»
13 years 10 months ago
An Adaptation Logic Framework for Java-based Component Systems
Abstract: This paper describes a Java-based framework for developing componentbased software systems supporting adaptation with logic laws and considering component interactions as...
Enrico Oliva, Antonio Natali, Alessandro Ricci, Mi...
ACJ
2002
122views more  ACJ 2002»
13 years 10 months ago
Product-Based Design of Business Processes Applied within the Financial Services
Business Process Reengineering (BPR) is an important instrument to boost the performance of business processes. In this paper, the Product-Based Design method is presented that su...
Hajo A. Reijers
MT
2000
72views more  MT 2000»
13 years 10 months ago
Discourse Particles and Discourse Functions
Spoken language, especially spoken German, is rich in particles that do not contribute to the propositional content of utterances, but play important roles in steering the flow of ...
Manfred Stede, Birte Schmitz