Sciweavers

2604 search results - page 330 / 521
» General constant expressions for system programming language...
Sort
View
ENTCS
2008
96views more  ENTCS 2008»
15 years 4 months ago
Maude as a Platform for Designing and Implementing Deep Inference Systems
Deep inference is a proof theoretical methodology that generalizes the traditional notion of inference in the sequent calculus: in contrast to the sequent calculus, the deductive ...
Ozan Kahramanogullari
ICALP
2003
Springer
15 years 9 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
HCW
1998
IEEE
15 years 9 months ago
On the Interaction between Mobile Processes and Objects
Java's remote method invocation mechanism provides a number of features that extend the functionality of traditional client server-based distributed systems. However, there a...
Suresh Jagannathan, Richard Kelsey
TAPSOFT
1997
Springer
15 years 8 months ago
Inclusion Constraints over Non-empty Sets of Trees
Abstract. We present a new constraint system called INES. Its constraints are conjunctions of inclusions t1 t2 between rst-order terms (without set operators) which are interpreted...
Martin Müller, Joachim Niehren, Andreas Podel...
IFM
2010
Springer
124views Formal Methods» more  IFM 2010»
15 years 3 months ago
Safe Commits for Transactional Featherweight Java
Abstract. Transactions are a high-level alternative for low-level concurrencycontrol mechanisms such as locks, semaphores, monitors. A recent proposal for integrating transactional...
Thi Mai Thuong Tran, Martin Steffen