Sciweavers

406 search results - page 56 / 82
» PL-detective: a system for teaching programming language con...
Sort
View
CP
2004
Springer
14 years 1 months ago
Constraint Propagation as a Proof System
Abstract. Refutation proofs can be viewed as a special case of constraint propagation, which is a fundamental technique in solving constraint-satisfaction problems. The generalizat...
Albert Atserias, Phokion G. Kolaitis, Moshe Y. Var...
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 5 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
WWW
2006
ACM
14 years 8 months ago
XPath filename expansion in a Unix shell
Locating files based on file system structure, file properties, and maybe even file contents is a core task of the user interface of operating systems. By adapting XPath's po...
Kaspar Giger, Erik Wilde
IFIP
1994
Springer
13 years 12 months ago
Modeling Motion Simulation with DEDS
The computer simulation control problem can be splitted in two parts, namely a local control problem and a global control problem. The local control de nes the \behavior" of ...
J. T. F. Camargo, Léo Pini Magalhães...
IFIP
2000
Springer
13 years 11 months ago
Implementing Open Network Technologies in Complex Work Practices: A Case from Telemedicine
New non-desktop technologies may turn out to be of a more open and generic nature than traditional information technologies. These technologies consequently pose novel challenges ...
Margunn Aanestad, Ole Hanseth