Sciweavers

2111 search results - page 268 / 423
» How to Program Pervasive Systems
Sort
View
235
Voted
AAIP
2009
15 years 3 months ago
Porting IgorII from Maude to Haskell
This paper describes our efforts and solutions in porting our IP system IGOR 2 from the termrewriting language MAUDE to HASKELL. We describe how, for our purpose necessary feature...
Martin Hofmann 0008, Emanuel Kitzelmann, Ute Schmi...
COMPSEC
2006
141views more  COMPSEC 2006»
15 years 2 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
120
Voted
COMSIS
2006
129views more  COMSIS 2006»
15 years 2 months ago
Constraint-Based Knowledge Representation for Individualized Instruction
Traditional knowledge representations were developed to encode complete, explicit and executable programs, a goal that makes them less than ideal for representing the incomplete an...
Stellan Ohlsson, Antonija Mitrovic
JDS
2006
44views more  JDS 2006»
15 years 2 months ago
Multiagent Matching Algorithms with and without Coach
The concept of "agent" has been used to describe many different artefacts: software programs, mobile robots, or even human beings. In a system consisting of many agents, ...
Frieder Stolzenburg, Jan Murray, Karsten Sturm
129
Voted
PLDI
2003
ACM
15 years 8 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang