Sciweavers

2625 search results - page 404 / 525
» The development of the Emerald programming language
Sort
View
ESOP
2005
Springer
15 years 10 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
IWPC
2000
IEEE
15 years 9 months ago
Tracing Object-Oriented Code into Functional Requirements
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual page...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
TOOLS
2000
IEEE
15 years 9 months ago
Design and Implementation of CORBA-Based Subscription Server
The standard CORBA operation invocation model supports synchronous, one-way, and deferred synchronous interactions between clients and servers. However, this model is too restrict...
R. Maheshwari, R. Fatoohi
PLDI
2000
ACM
15 years 9 months ago
Exploiting superword level parallelism with multimedia instruction sets
Increasing focus on multimedia applications has prompted the addition of multimedia extensions to most existing general purpose microprocessors. This added functionality comes pri...
Samuel Larsen, Saman P. Amarasinghe
BIRTHDAY
2000
Springer
15 years 9 months ago
FFF97 - Oberon in the Real World
The Oberon programming language and system, subsequently called the Oberon technology, are well known in the software research community. Few applications, however, exist outside ...
Josef Templ