Sciweavers

890 search results - page 97 / 178
» Programming language methods in computer security
Sort
View
ECOOP
1993
Springer
14 years 2 months ago
A Timed Calculus for Distributed Objects with Clocks
This paper proposes a formalism for reasoning about distributed object-oriented computations. The formalism is an extension of Milner’s CCS with the notion of local time. It allo...
Ichiro Satoh, Mario Tokoro

Book
310views
15 years 5 months ago
Mastering Enterprise JavaBeans Third Edition
"Published in January 2005, the best-selling book Mastering EJB is now in its third edition and has been updated for EJB2.1 and also features new chapters on security and Web ...
Ed Roman, Rima Patel Sriganesh, and Gerald Brose
DSOM
2004
Springer
14 years 3 months ago
HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management
Autonomic distributed management enables for deploying self-directed monitoring and control tasks that track dynamic network problems such as performance degradation and security t...
Ehab S. Al-Shaer, Bin Zhang
AGP
2010
IEEE
14 years 3 months ago
Constraint Logic Programming
Constraint Logic Programming (CLP) is one of the most successful branches of Logic Programming; it attracts the interest of theoreticians and practitioners, and it is currently use...
Marco Gavanelli, Francesca Rossi
MMMACNS
2001
Springer
14 years 2 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato