Sciweavers

890 search results - page 72 / 178
» Programming language methods in computer security
Sort
View
OOPSLA
2004
Springer
14 years 3 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
POPL
1992
ACM
14 years 2 months ago
A Compilation Method for ML-Style Polymorphic Record Calculi
Polymorphic record calculi have recently attracted much attention as a typed foundation for objectoriented programming. This is based on the fact that a function that selects a fi...
Atsushi Ohori
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
VL
1996
IEEE
157views Visual Languages» more  VL 1996»
14 years 2 months ago
Visualizing Program Executions on Large Data Sets
Understanding and interpreting a large data source is an important but challenging operation in many technical disciplines. Computer visualization has become a valuable tool to he...
John T. Stasko, Jeyakumar Muthukumarasamy
IFL
2003
Springer
144views Formal Methods» more  IFL 2003»
14 years 3 months ago
Building an Interface Between Eden and Maple: A Way of Parallelizing Computer Algebra Algorithms
Eden is a parallel functional language extending Haskell with processes. This paper describes the implementation of an interface between the Eden language and the Maple system. The...
Rafael Martínez, Ricardo Pena