Sciweavers

4386 search results - page 460 / 878
» A Tamper-Resistant Programming Language System
Sort
View
ICALP
2001
Springer
15 years 9 months ago
Lower Bounds for the Weak Pigeonhole Principle Beyond Resolution
We work with an extension of Resolution, called Res(2), that allows clauses with conjunctions of two literals. In this system there are rules to introduce and eliminate such conju...
Albert Atserias, Maria Luisa Bonet, Juan Luis Este...
POPL
2000
ACM
15 years 8 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
POPL
1993
ACM
15 years 8 months ago
Formal Parametric Polymorphism
A polymorphic function is parametric if its behavior does not depend on the type at which it is instantiated. Starting with Reynolds's work, the study of parametricity is typ...
Martín Abadi, Luca Cardelli, Pierre-Louis C...
UM
2009
Springer
15 years 11 months ago
Evaluating Web Based Instructional Models Using Association Rule Mining
Abstract. In this paper we describe an Integrated Development System for Instructional Model for E-learning (INDESIME) to create and to maintain instructional models using adaptive...
Enrique García, Cristóbal Romero, Se...
ADAEUROPE
2003
Springer
15 years 9 months ago
Modules for Crosscutting Models
Traditional programming languages assume that real-world systems have “intuitive”, mind-independent, preexisting concept hierarchies. However, our perception of the world depen...
Mira Mezini, Klaus Ostermann