Sciweavers

656 search results - page 88 / 132
» Parameterized Types for Java
Sort
View
SPC
2005
Springer
14 years 1 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
ECAI
2004
Springer
14 years 1 months ago
Introducing Alias Information into Model-Based Debugging
Model-based diagnosis applied to computer programs has been studied for several years. Although there are still weaknesses in the used models, especially on dealing with dynamic da...
Daniel Köb, Franz Wotawa
GPCE
2004
Springer
14 years 1 months ago
A Fresh Calculus for Name Management
Abstract. We define a basic calculus for name management, which is obtained by an appropriate combination of three ingredients: extensible records (in a simplified form), names (...
Davide Ancona, Eugenio Moggi
SGAI
2004
Springer
14 years 1 months ago
OntoSearch: An Ontology Search Engine
Reuse of knowledge bases and the semantic web are two promising areas in knowledge technologies. Given some user requirements, finding the suitable ontologies is an important task...
Yi Zhang, Wamberto Weber Vasconcelos, Derek H. Sle...
ACSC
2002
IEEE
14 years 21 days ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered