Sciweavers

2111 search results - page 308 / 423
» How to Program Pervasive Systems
Sort
View
ICTCS
2005
Springer
14 years 3 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
SERA
2005
Springer
14 years 3 months ago
MADL: Meta Architecture Description Language
: The techniques of meta-modeling and meta-levels have become a mature concept and have been largely used to solve real problems in programming languages, distributed environments,...
Adel Smeda, Mourad Oussalah, Tahar Khammaci
VMCAI
2004
Springer
14 years 3 months ago
Automatic Inference of Class Invariants
Abstract. We present a generic framework for the automatic and modular inference of sound class invariants for class-based object oriented languages. The idea is to derive a sound ...
Francesco Logozzo
APSEC
2003
IEEE
14 years 2 months ago
Case study: Reconnaissance techniques to support feature location using RECON2
Change requests are often formulated into concepts or features that a maintainer can understand. One of the main issues faced by a maintainer is to know and locate “where does t...
Suhaimi Ibrahim, Norbik Bashah Idris, Aziz Deraman
WETICE
2003
IEEE
14 years 2 months ago
Agent.Hospital - agent-based open framework for clinical applications
Agent.Hospital is an open agent-based (software) framework for distributed applications in the healthcare domain. Previous appropriation of the Agent.Hospital development is appli...
Stefan Kirn, Christian Heine, Rainer Herrler, Karl...