Sciweavers

6054 search results - page 1072 / 1211
» Implementation of Andorra-based Languages
Sort
View
TSE
2008
128views more  TSE 2008»
13 years 10 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
JOT
2007
100views more  JOT 2007»
13 years 10 months ago
Software Design Metrics for Object-Oriented Software
The importance of software measurement is increasing leading to development of new measurement techniques. As the development of object-oriented software is rising, more and more ...
K. K. Aggarwal, Yogesh Singh, Arvinder Kaur, Ruchi...
CL
2004
Springer
13 years 10 months ago
Safe metaclass composition using mixin-based inheritance
In the context of meta-programming and reflective languages, classes are treated as full fledged objects which are instances of other classes named metaclasses. Metaclasses have p...
Noury Bouraqadi
CN
2000
76views more  CN 2000»
13 years 10 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
CLUSTER
2002
IEEE
13 years 10 months ago
CEJVM: "Cluster Enabled Java Virtual Machine"
CEJVM is a cluster enabled Java Virtual Machine, which executes in a distributed fashion among collaborating nodes of a dedicated cluster. It extends Java`s multithreading mechani...
Muhammad Umar Janjua, Mehboob Yasin, Ch. Falak She...
« Prev « First page 1072 / 1211 Last » Next »