Sciweavers

1532 search results - page 278 / 307
» Embodied mobile agents
Sort
View
COOPIS
2000
IEEE
14 years 3 days ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
POPL
2000
ACM
14 years 1 days ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
WOSP
2000
ACM
14 years 1 days ago
A pattern-based approach to model software performance
In this paper we present a formal approach to analyse performance for distributed systems, which is integrated in the early stages of the software development process. We propose ...
José Merseguer, Javier Campos, Eduardo Mena
ECOOP
2000
Springer
14 years 21 hour ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews
NDSS
1999
IEEE
13 years 12 months ago
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...
Andreu Riera, Joan Borrell