Sciweavers

1770 search results - page 107 / 354
» Writing requirements in computer security
Sort
View
PLDI
2006
ACM
14 years 4 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
IPPS
2006
IEEE
14 years 4 months ago
Algorithmic skeletons for stream programming in embedded heterogeneous parallel image processing applications
Algorithmic skeletons can be used to write architecture independent programs, shielding application developers from the details of a parallel implementation. In this paper, we pre...
Wouter Caarls, Pieter P. Jonker, Henk Corporaal

Book
695views
15 years 5 months ago
The Scheme Programming Language
"Scheme is a general-purpose computer programming language. It is a high-level language, supporting operations on structured data such as strings, lists, and vectors, as well ...
R. Kent Dybvig
GI
2001
Springer
14 years 2 months ago
Transaction Synchronization for XML Data in Client-Server Web Applications
: Whenever database centered client-server web applications have to be used by multiple web clients on different platforms, then recently XML has been considered as an important da...
Stefan Böttcher, Adelhard Türling
NPAR
2000
ACM
14 years 2 months ago
Art-based rendering with continuous levels of detail
In previous work [6], we presented an algorithm for rendering virtual scenes using art-based styles. We demonstrated the ability to render fur, grass, and trees in a stylized mann...
Lee Markosian, Barbara J. Meier, Michael A. Kowals...