Sciweavers

164 search results - page 24 / 33
» Rewriting Extended Regular Expressions
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 26 days ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ICFEM
2010
Springer
13 years 7 months ago
Dynamic Resource Reallocation between Deployment Components
Abstract. Today’s software systems are becoming increasingly configurable and designed for deployment on a plethora of architectures, ranging from sequential machines via multic...
Einar Broch Johnsen, Olaf Owe, Rudolf Schlatte, Si...
LATA
2009
Springer
14 years 3 months ago
A Kleene Theorem for Forest Languages
This paper proposes an alternative approach to the standard notion of rational (or regular) expression for tree languages. The main difference is that in the new notion we have on...
Lutz Straßburger
ASIAN
2003
Springer
102views Algorithms» more  ASIAN 2003»
14 years 1 months ago
Generating Optimal Linear Temporal Logic Monitors by Coinduction
Abstract. A coinduction-based technique to generate an optimal monitor from a Linear Temporal Logic (LTL) formula is presented in this paper. Such a monitor receives a sequence of ...
Koushik Sen, Grigore Rosu, Gul Agha
GPCE
2004
Springer
14 years 2 months ago
Taming Macros
Scheme includes a simple yet powerful macro mechanism. Using macros, programmers can easily extend the language with new kinds of expressions and definitions, thus abstracting ove...
Ryan Culpepper, Matthias Felleisen