Sciweavers

2290 search results - page 20 / 458
» Extensible Protected Types
Sort
View
ICDCIT
2004
Springer
14 years 29 days ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller
ICC
2007
IEEE
103views Communications» more  ICC 2007»
14 years 1 months ago
Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks
—Providing differentiated Quality-of-Protection (QoP) for surviving single-link failures in WDM mesh networks has been extensively studied in recent years. This paper investigate...
Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang
ICCAD
2002
IEEE
103views Hardware» more  ICCAD 2002»
14 years 4 months ago
A technology-independent CAD tool for ESD protection device extraction: ESDExtractor
The challenges for developing an ESD (Electro-static Discharge) layout extractor originate from unconventional layout patterns of ESD protection devices, parasitic ESD device extr...
Rouying Zhan, Haigang Feng, Qiong Wu, Guang Chen, ...
BIRTHDAY
2004
Springer
14 years 1 months ago
Pure Type Systems in Rewriting Logic: Specifying Typed Higher-Order Languages in a First-Order Logical Framework
Abstract. The logical and operational aspects of rewriting logic as a logical framework are tested and illustrated in detail by representing pure type systems as object logics. Mor...
Mark-Oliver Stehr, José Meseguer
PLPV
2012
ACM
12 years 3 months ago
LTL types FRP: linear-time temporal logic propositions as types, proofs as functional reactive programs
Functional Reactive Programming (FRP) is a form of reactive programming whose model is pure functions over signals. FRP is often expressed in terms of arrows with loops, which is ...
Alan Jeffrey