This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
CT In order to support location-aware applications it is necessary to locate people and equipment in near real-time. To avoid unnecessary exposure of details of the underlying trac...
The author is revising and restructuring an existing simulation course designed primarily for senior computer science majors by: 1) developing an integrated set of laboratory exer...
This paper introduces the notions of mask and multiple format for setting up a progressive access to information in an Information System. Masks consist of more or less complete r...
Traits support the factoring out of common behaviour, and its integration into classes in a manner that coexists smoothly with inheritance-based structuring mechanisms. We designed...