Sciweavers

4386 search results - page 462 / 878
» A Tamper-Resistant Programming Language System
Sort
View
ECOOP
2006
Springer
15 years 8 months ago
Evolution of an Adaptive Middleware Exploiting Architectural Reflection
: Nowadays information systems are required to adapt themselves dynamically to the ever changing environment and requirements. Architectural reflection represents a principled mean...
Francesca Arcelli Fontana, Claudia Raibulet
IFIP
2000
Springer
15 years 8 months ago
Representing Human and Non-human Stakeholders: On Speaking with Authority
Information systems research is concerned with complex imbroglios of human and non-human components. As researchers, we need ways to represent the intricacies of the different sta...
Athanasia Pouloudi, Edgar A. Whitley
CSFW
2008
IEEE
15 years 6 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
ECOOP
2008
Springer
15 years 6 months ago
A Model for Java with Wildcards
Wildcards are a complex and subtle part of the Java type system, present since version 5.0. Although there have been various formalisations and partial type soundness results conce...
Nicholas R. Cameron, Sophia Drossopoulou, Erik Ern...
EJC
2000
15 years 5 months ago
A Communicating Tree Model for Generating Network Applications
We present a new model for generating network applications. Our model is based on trees communicating with each other. Our model is simple to understand, but yet powerful enough to...
Tomohiro Matsuzaki, Takehiro Tokuda