Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
The structure of the image synthesis process naturally leads to the use of object-oriented software design and many existing rendering systems are based on some kind of object-orie...
We describe an automatic verification method to check whether transactional memories ensure strict serializability--a key property assumed of the transactional interface. Our main...
Abstract. We describe a methodology for developing and deploying distributed Java applications using a reflective middleware system called RAFDA. We illustrate the methodology by d...
Graham N. C. Kirby, Scott M. Walker, Stuart J. Nor...
Abstract In this paper we present a framework defining the architecture of systems providing software components with means to contractualise their resource access conditions with...