Sciweavers

12697 search results - page 2338 / 2540
» Call for Papers
Sort
View
SAFECOMP
2005
Springer
14 years 4 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
SAS
2005
Springer
114views Formal Methods» more  SAS 2005»
14 years 4 months ago
Type-Safe Optimisation of Plugin Architectures
Programmers increasingly implement plugin architectures in type-safe object-oriented languages such as Java. A virtual machine can dynamically load class files containing plugins,...
Neal Glew, Jens Palsberg, Christian Grothoff
STORYTELLING
2005
Springer
14 years 4 months ago
An Emotional Architecture for Virtual Characters
This paper presents the mechanisms proposed by a generic cognitive architecture for virtual characters with emotional influenced behaviors, called cognitiva, to maintain behavior ...
Ricardo Imbert, Angélica de Antonio
TACAS
2005
Springer
113views Algorithms» more  TACAS 2005»
14 years 4 months ago
jETI: A Tool for Remote Tool Integration
Abstract. We present jETI, a redesign of the Electronic Tools Integration platform (ETI), that addresses the major issues and concerns accumulated over seven years of experience wi...
Tiziana Margaria, Ralf Nagel, Bernhard Steffen
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 4 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
« Prev « First page 2338 / 2540 Last » Next »