Sciweavers

917 search results - page 120 / 184
» What Context Matters
Sort
View
IWPC
2009
IEEE
14 years 3 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
LICS
2009
IEEE
14 years 3 months ago
Functional Reachability
—What is reachability in higher-order functional programs? We formulate reachability as a decision problem in the setting of the prototypical functional language PCF, and show th...
C.-H. Luke Ong, Nikos Tzevelekos
POLICY
2009
Springer
14 years 3 months ago
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure
—Policy definition is an important component of the consistent authorisation service infrastructure that could be effectively integrated with the general resource provisioning wo...
Yuri Demchenko, Mihai Cristea, Cees de Laat
TARK
2009
Springer
14 years 3 months ago
Contractual traps
In numerous economic scenarios, contracting parties may not have a clear picture of all the relevant aspects. While confronted with these unawareness issues, the strategic decisio...
Ying-Ju Chen, Xiaojian Zhao
JCDL
2009
ACM
121views Education» more  JCDL 2009»
14 years 3 months ago
Improving historical research by linking digital library information to a global genealogical database
Journals, letters, and other writings are of great value to historians and those who research their own family history; however, it can be difficult to find writings by specific...
Douglas J. Kennard, William B. Lund, Bryan S. Mors...