Sciweavers

890 search results - page 127 / 178
» software 1998
Sort
View
CJ
1998
63views more  CJ 1998»
13 years 8 months ago
Protecting IT Systems from Cyber Crime
Large-scale commercial, industrial and financial operations are becoming ever more interdependent, and ever more dependent on IT. At the same time, the rapidly growing interconnec...
R. Benjamin, B. Gladman, Brian Randell
ENTCS
1998
90views more  ENTCS 1998»
13 years 8 months ago
Handling ELAN rewrite programs via an exchange format
Designing a programming environment raises difficult implementation problems since such software is not just one piece of code able to execute programs expressed in a given progra...
Peter Borovanský, Salma Jamoussi, Pierre-Et...
ET
1998
99views more  ET 1998»
13 years 8 months ago
A Behavior Model for Next Generation Test Systems
Defining information required by automatic test systems frequently involves a description of system behavior. To facilitate capturing the required behavior information in the cont...
Lee A. Shombert, John W. Sheppard
UIST
1998
ACM
14 years 1 months ago
Graphical Query Specification and Dynamic Result Previews for a Digital Library
Textual query languages based on Boolean logic are common amongst the search facilities of on-line information repositories. However, there is evidence to suggest that the syntact...
Steve Jones
FOSSACS
1998
Springer
14 years 1 months ago
Functor Categories and Two-Level Languages
Abstract. We propose a denotational semantics for the two-level language of [GJ91, Gom92], and prove its correctness w.r.t. a standard denotational semantics. Other researchers (se...
Eugenio Moggi