Sciweavers

832 search results - page 153 / 167
» Mutation of Java Objects
Sort
View
POPL
1999
ACM
13 years 11 months ago
JFlow: Practical Mostly-Static Information Flow Control
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
Andrew C. Myers
HICSS
1999
IEEE
178views Biometrics» more  HICSS 1999»
13 years 11 months ago
Collaborative Web Crawling: Information Gathering/Processing over Internet
The main objective of the IBM Grand Central Station (GCS) is to gather information of virtually any type of formats (text, data, image, graphics, audio, video) from the cyberspace...
Shang-Hua Teng, Qi Lu, Matthias Eichstaedt, Daniel...
DSOM
1999
Springer
13 years 11 months ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
UIST
1997
ACM
13 years 11 months ago
Solving Linear Arithmetic Constraints for User Interface Applications
Linear equality and inequality constraints arise naturally in specifying many aspects of user interfaces, such as requiring that one window be to the left of another, requiring th...
Alan Borning, Kim Marriott, Peter J. Stuckey, Yi X...
ECOOP
1997
Springer
13 years 11 months ago
Near Optimal Hierarchical Encoding of Types
A type inclusion test is a procedure to decide whether two types are related by a given subtyping relationship. An efficient implementation of the type inclusion test plays an impo...
Andreas Krall, Jan Vitek, R. Nigel Horspool