Sciweavers

1052 search results - page 94 / 211
» Understanding POWER multiprocessors
Sort
View
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 2 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
VISSOFT
2002
IEEE
14 years 2 months ago
Visualization of Component-based Software
New component-based techniques are emerging, leading to new ways to develop software. Industrial component technologies such as COM, JavaBeans, EJB, or CCM are powerful but their ...
Jean-Marie Favre, Humberto Cervantes
ESOP
2001
Springer
14 years 1 months ago
Secure Information Flow and CPS
Security-typed languages enforce confidentiality or integrity policies by type checking. This paper investigates continuation-passing style (CPS) translation of such languages as ...
Steve Zdancewic, Andrew C. Myers
ITICSE
1997
ACM
14 years 1 months ago
Recursion and grammars for CS2
A programming exercise on recursion in which students create drawings of simple and bracketed Lindenmayer Systems provides a context for exploring additional computer science conc...
Viera K. Proulx
CONCUR
1995
Springer
14 years 19 days ago
Characterizing Behavioural Congruences for Petri Nets
Abstract. We exploit a notion of interface for Petri nets in order to design a set of net combinators. For such a calculus of nets, we focus on the behavioural congruences arising ...
Mogens Nielsen, Lutz Priese, Vladimiro Sassone