Sciweavers

325 search results - page 58 / 65
» Rewriting Strategies in Java
Sort
View
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
14 years 13 days ago
The Succinct Solver Suite
Abstract. The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. Th...
Flemming Nielson, Hanne Riis Nielson, Hongyan Sun,...
CIA
2003
Springer
14 years 9 days ago
Send Fredo off to Do This, Send Fredo off to Do That
Abstract. Fredo is a generic domain-independent broker that creates valueadded information taking into account the preferences specified by its clients. Fredo uses ontology service...
Luís Miguel Botelho, Hugo Mendes, Pedro Fig...
DEXAW
2002
IEEE
133views Database» more  DEXAW 2002»
14 years 1 days ago
ESOW: Parallel/Distributed Programming on the Web
This paper presents an environment for supporting parallel/distributed programming using Java with RMI and RMI-IIOP (CORBA). The environment implements the notion of Shared Object...
Denivaldo Lopes, Slimane Hammoudi, Zair Abdelouaha...
EDOC
2002
IEEE
14 years 1 days ago
Anti-Yacc: MOF-to-Text
The Object Management Group (OMG) is pursuing its new Model-Driven Architecture (MDA) strategy. The Meta-Object Facility (MOF) is an important technology to support the MDA, both ...
David Hearnden, Kerry Raymond, Jim Steel
NDSS
2002
IEEE
14 years 8 hour ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...