Sciweavers

357 search results - page 60 / 72
» From C Programs to the Configure-Execute Model
Sort
View
POPL
2005
ACM
14 years 8 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
ICSE
2008
IEEE-ACM
14 years 8 months ago
Answering conceptual queries with Ferret
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers at...
Brian de Alwis, Gail C. Murphy
ICCS
2007
Springer
14 years 1 months ago
Multilingual Interfaces for Parallel Coupling in Multiphysics and Multiscale Systems
Abstract. Multiphysics and multiscale simulation systems are emerging as a new grand challenge in computational science, largely because of increased computing power provided by th...
Everest T. Ong, Jay Walter Larson, Boyana Norris, ...
SIGSOFT
2009
ACM
14 years 11 days ago
Qos-driven runtime adaptation of service oriented architectures
Runtime adaptation is recognized as a viable way for a serviceoriented system to meet QoS requirements in its volatile operating environment. In this paper we propose a methodolog...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung