Sciweavers

2416 search results - page 34 / 484
» The design and implementation of typed scheme
Sort
View
TIM
2010
112views Education» more  TIM 2010»
13 years 3 months ago
Helmholtz-Type Regularization Method for Permittivity Reconstruction Using Experimental Phantom Data of Electrical Capacitance T
Electrical capacitance tomography (ECT) attempts to image the permittivity distribution of an object by measuring the electrical capacitance between sets of electrodes placed aroun...
Manuchehr Soleimani, Phaneendra K. Yalavarthy, Ham...
ICFP
2010
ACM
13 years 9 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
SELMAS
2004
Springer
14 years 2 months ago
Aspectizing Multi-agent Systems: From Architecture to Implementation
Agent architectures have to cope with a number of internal properties (concerns), such as autonomy, learning, and mobility. As the agent complexity increases, these agent propertie...
Alessandro F. Garcia, Uirá Kulesza, Carlos ...
LISP
2002
107views more  LISP 2002»
13 years 8 months ago
Dependent Types for Program Termination Verification
Program termination verification is a challenging research subject of significant practical importance. While there is already a rich body of literature on this subject, it is sti...
Hongwei Xi
ACSC
2004
IEEE
14 years 12 days ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...