In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
One of the challenging problems for software developers is guaranteeing that a system as built is consistent with its architectural design. In this paper we describe a technique t...
Hong Yan, David Garlan, Bradley R. Schmerl, Jonath...
Despite constant improvements in fabrication technology, hardware components are consuming more power than ever. With the everincreasing demand for higher performance in highly-in...
Convenience, reliability, and effectiveness of automatic memory management have long been established in modern systems and programming languages such as Java. The timeliness req...
In this paper, we discuss scripting tools that aim at facilitating the design of web-based interactions with animated characters capable of affective communication. Specifically, ...
Helmut Prendinger, Sylvain Descamps, Mitsuru Ishiz...