Sciweavers

2625 search results - page 461 / 525
» The development of the Emerald programming language
Sort
View
IADIS
2004
15 years 5 months ago
A distributed monitoring system with global network and Web technology
A distributed monitoring system has been developed, which is organized with network cameras, an integrated web/mail server, web-based clients including high-performance cellular p...
Yoshiro Imai, Daisuke Yamane, Osamu Sadayuki
TCS
2008
15 years 4 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
CSFW
2009
IEEE
15 years 11 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
SCAM
2008
IEEE
15 years 10 months ago
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
—More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by diffe...
Nuno F. Rodrigues, Luís Soares Barbosa
PPPJ
2006
ACM
15 years 10 months ago
The Project Maxwell assembler system
The JavaTM programming language is primarily used for platform-independent programming. Yet it also offers many productivity, maintainability and performance benefits for platfo...
Bernd Mathiske, Douglas N. Simon, Dave Ungar