Sciweavers

1054 search results - page 16 / 211
» Guarded Expressions in Practice
Sort
View
TGC
2005
Springer
14 years 3 months ago
A General Name Binding Mechanism
We study fusion and binding mechanisms in name passing process calculi. To this purpose, we introduce the U-Calculus, a process calculus with no I/O polarities and a unique form of...
Michele Boreale, Maria Grazia Buscemi, Ugo Montana...
CAISE
2001
Springer
14 years 2 months ago
Using UML Action Semantics for Executable Modeling and Beyond
The UML lacks precise and formal foundations for several constructs such as transition guards or method bodies, for which it resorts to semantic loopholes in the form of “uninter...
Gerson Sunyé, François Pennaneac'h, ...
SP
2008
IEEE
14 years 4 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
SAJ
2002
105views more  SAJ 2002»
13 years 9 months ago
Hierarchical level of detail optimization for constant frame rate rendering of radiosity scenes
The predictive hierarchical level of detail optimization algorithm of Mason and Blake is experimentally evaluated in the form of a practical application to hierarchical radiosity....
Shaun Nirenstein, Edwin H. Blake, Simon Winberg, A...
LPAR
2010
Springer
13 years 8 months ago
On the Complexity of Model Expansion
Abstract. We study the complexity of model expansion (MX), which is the problem of expanding a given finite structure with additional relations to produce a finite model of a giv...
Antonina Kolokolova, Yongmei Liu, David G. Mitchel...