Sciweavers

20 search results - page 3 / 4
» On Conversation Policies and the Need for Exceptions
Sort
View
ATAL
2007
Springer
14 years 2 months ago
An event-driven approach for agent-based business process enactment
Agents enacting business processes in large open environments need to adaptively accommodate exceptions. Work on multiagent approaches can flexibly model business processes. This...
Payal Chakravarty, Munindar P. Singh
SAC
2009
ACM
14 years 15 days ago
Leveraging OWL for GIS interoperability: rewards and pitfalls
Information systems often require combining datasets available in different formats, and geographical information systems are no exception. While semantic technologies have been u...
Serge Boucher, Esteban Zimányi
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
13 years 7 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
ESOP
2005
Springer
14 years 1 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
ESORICS
2009
Springer
13 years 11 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel