Sciweavers

4386 search results - page 707 / 878
» A Tamper-Resistant Programming Language System
Sort
View
114
Voted
SCAM
2007
IEEE
15 years 9 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
APLAS
2006
ACM
15 years 9 months ago
Using Metadata Transformations to Integrate Class Extensions in an Existing Class Hierarchy
Abstract. Class extensions provide a fine-grained mechanism to define incremental modifications to class-based systems when standard subclassing mechanisms are inappropriate. To...
Markus Lumpe
DUX
2007
15 years 7 months ago
AnyPhone: mobile applications for everyone
The mobile phone is one of the most commonly carried pieces of personal, readily accessible digital technologies. Beyond just voice calls, they function as digital cameras, PDAs, ...
Eric Paulos, August Joki, Parul Vora, Anthony Burk...
116
Voted
ATAL
2010
Springer
15 years 4 months ago
To teach or not to teach?: decision making under uncertainty in ad hoc teams
In typical multiagent teamwork settings, the teammates are either programmed together, or are otherwise provided with standard communication languages and coordination protocols. ...
Peter Stone, Sarit Kraus
ESIAT
2009
IEEE
15 years 1 months ago
Design of Distributed Architecture Based on Java Remote Method Invocation Technology
Remote method invocation is a distributed object model for the Java programming language that making distributed objects easy to implement and tousle. Remote method invocation appl...
Delin Hou, Huosong Xia