Sciweavers

1153 search results - page 83 / 231
» Compositional Specification Calculus for Information Systems...
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 9 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
EXACT
2008
15 years 6 months ago
A Temporal Abductive Diagnostic Process for Runtime Properties Violations
The monitoring of properties of complex software systems can provide the core functionality for detecting violations of such properties. However, the violations detection cannot be...
Theocharis Tsigkritis, George Spanoudakis
PLDI
2005
ACM
15 years 9 months ago
Permission-based ownership: encapsulating state in higher-order typed languages
Today’s module systems do not effectively support information hiding in the presence of shared mutable objects, causing serious problems in the development and evolution of larg...
Neelakantan R. Krishnaswami, Jonathan Aldrich
132
Voted
SCP
2008
144views more  SCP 2008»
15 years 4 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...
ENTCS
2002
97views more  ENTCS 2002»
15 years 3 months ago
Plan in Maude: Specifying an Active Network Programming Language
PLAN is a language designed for programming active networks, and can more generally be regarded as a model of mobile computation. PLAN generalizes the paradigm of imperative funct...
Mark-Oliver Stehr, Carolyn L. Talcott