Sciweavers

890 search results - page 42 / 178
» Programming language methods in computer security
Sort
View
DBPL
2009
Springer
131views Database» more  DBPL 2009»
14 years 4 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...
SAS
2004
Springer
134views Formal Methods» more  SAS 2004»
14 years 3 months ago
Towards Declarative Programming for Web Services
ness Refinement in Abstract Symbolic Trajectory Evaluation . . . . 38 Mila Dalla Preda Constraint-Based Linear-Relations Analysis . . . . . . . . . . . . . . . . . . . . . . . . ....
Sheila A. McIlraith
MEMOCODE
2010
IEEE
13 years 8 months ago
Compilation of imperative synchronous programs with refined clocks
To overcome over-synchronization in synchronous programs, we recently introduced clock refinement to our synchronous programming language Quartz. This extension basically allows p...
Mike Gemunde, Jens Brandt, Klaus Schneider
DALT
2005
Springer
14 years 3 months ago
Modelling Uncertainty in Agent Programming
Existing cognitive agent programming languages that are based on the BDI model employ logical representation and reasoning for implementing the beliefs of agents. In these programm...
Johan Kwisthout, Mehdi Dastani
SAC
2009
ACM
14 years 4 months ago
Matching ThisType to subtyping
The notion of ThisType has been proposed to promote typesafe reuse of binary methods and recently extended to mutually recursive definitions. It is well-known, however, that This...
Chieri Saito, Atsushi Igarashi