Sciweavers

718 search results - page 134 / 144
» Operational Semantics of Security Protocols
Sort
View
OOPSLA
2004
Springer
14 years 1 months ago
Scalable extensibility via nested inheritance
Inheritance is a useful mechanism for factoring and reusing code. However, it has limitations for building extensible systems. We describe nested inheritance, a mechanism that add...
Nathaniel Nystrom, Stephen Chong, Andrew C. Myers
FMLDO
1990
Springer
86views Database» more  FMLDO 1990»
13 years 12 months ago
Views in Object-Oriented Databases
Object-oriented database systems (ooDBMSs) are supposed to offer at least the functionality available in commercial relational DBMSs of today. One important consequence of this is...
Marc H. Scholl, Christian Laasch, Markus Tresch
DLS
2008
264views Languages» more  DLS 2008»
13 years 9 months ago
Contextual values
Context-oriented programming proposes to treat execution context explicitly and to provide means for context-dependent adaptation at runtime. There are many mechanisms that can be...
Éric Tanter
IEEEPACT
1998
IEEE
14 years 1 days ago
Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory
Software fine-grain distributed shared memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs tar...
Ioannis Schoinas, Babak Falsafi, Mark D. Hill, Jam...
USS
2004
13 years 9 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp