Sciweavers

2826 search results - page 377 / 566
» A resource-based analysis of IT sourcing
Sort
View
CSFW
2003
IEEE
15 years 7 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
SCAM
2002
IEEE
15 years 6 months ago
Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages
This paper concerns the use of static analysis for debugging purposes of declarative object-oriented equation-based modeling languages. We propose a framework where over- and unde...
Peter Bunus, Peter Fritzson
122
Voted
JTRES
2009
ACM
15 years 6 months ago
A technology compatibility kit for safety critical Java
Safety Critical Java is a specification being built on top a subset of interfaces from the Real-Time Specification for Java. It is designed to ease development and analysis of s...
Lei Zhao, Daniel Tang, Jan Vitek
HICSS
1998
IEEE
120views Biometrics» more  HICSS 1998»
15 years 6 months ago
Designing the Digital Agora: Pushing the Web Envelope
The Digital Agora is an information resource that supports understanding and analysis of complex problems in the social sciences. Large amounts of data are available from many dif...
Carolyn R. Watters, Michael A. Shepherd, Cynthia A...
93
Voted
ELPUB
1998
ACM
15 years 6 months ago
The Role of the Local Alphabet in Enhancing of the Development of Digital Communication and the Associated Problems
One of the often overlooked aspects of the today’s electronic information spread is that not all people use the Latin alphabet for writing, and even those who use it do not use ...
Zoran Gligorov, Filip Stojanovski