Sciweavers

4281 search results - page 113 / 857
» How to Disembed a Program
Sort
View
LISP
2008
97views more  LISP 2008»
15 years 2 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea
122
Voted
ENTCS
2007
101views more  ENTCS 2007»
15 years 2 months ago
A Framework for Timed Concurrent Constraint Programming with External Functions
The timed concurrent constraint programming language (tccp in short) was introduced for modeling reactive systems. This language allows one to model in a very intuitive way typica...
María Alpuente, Bernhard Gramlich, Alicia V...
106
Voted
CORR
2004
Springer
140views Education» more  CORR 2004»
15 years 2 months ago
Checking modes of HAL programs
Recent constraint logic programming (CLP) languages, such as HAL and Mercury, require type, mode and determinism declarations for predicates. This information allows the generatio...
Maria J. García de la Banda, Warwick Harvey...
CONCURRENCY
2000
101views more  CONCURRENCY 2000»
15 years 2 months ago
Wide-area parallel programming using the remote method invocation model
Java's support for parallel and distributed processing makes the language attractive for metacomputing applications, such as parallel applications that run on geographically ...
Rob van Nieuwpoort, Jason Maassen, Henri E. Bal, T...
CSREASAM
2010
14 years 11 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...