Sciweavers

365 search results - page 63 / 73
» Types for Safe Locking
Sort
View
DBPL
1999
Springer
114views Database» more  DBPL 1999»
14 years 1 months ago
Structured Document Transformations Based on XSL
Abstract. Based on the recursion mechanism of the XML transformation language XSL, the document transformation language DTL is defined. First the instantiation DTLreg is considere...
Sebastian Maneth, Frank Neven
OOPSLA
2000
Springer
14 years 16 days ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
ADC
2008
Springer
114views Database» more  ADC 2008»
13 years 11 months ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang
ATAL
2008
Springer
13 years 11 months ago
Mitigating catastrophic failure at intersections of autonomous vehicles
Fully autonomous vehicles promise enormous gains in safety, efficiency, and economy. Before such gains can be realized, safety and reliability concerns must be addressed. We have ...
Kurt M. Dresner, Peter Stone
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
13 years 11 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll