Sciweavers

759 search results - page 44 / 152
» What Can Be Implemented Anonymously
Sort
View
OOPSLA
2007
Springer
14 years 4 months ago
Understanding programmer language
The use of bad names — names that are wrong, inconsistent or inconcise — hinder program comprehension. The root of the problem is that there is no mechanism for aligning the n...
Einar W. Høst
ITRUST
2005
Springer
14 years 3 months ago
Trust Management Survey
Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in ...
Sini Ruohomaa, Lea Kutvonen
SIGOPSE
2004
ACM
14 years 3 months ago
Constructing component-based extension interfaces in legacy systems code
Implementing an extension of a legacy operating system requires knowing what functionalities the extension should provide and how the extension should be integrated with the legac...
Gilles Muller, Julia L. Lawall, Jean-Marc Menaud, ...
SPLC
2008
13 years 11 months ago
Automated Domain-Specific Modeling Languages for Generating Framework-Based Applications
The adoption of Domain-Specific Modeling Languages (DSMLs) for generating framework-based applications has proved to be an effective way of enforcing the correct use of frameworks...
André L. Santos, Kai Koskimies, Antó...
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 11 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...