Sciweavers

42388 search results - page 8325 / 8478
» Classification Using Information
Sort
View
115
Voted
ESOP
2003
Springer
15 years 8 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
FMCO
2003
Springer
162views Formal Methods» more  FMCO 2003»
15 years 8 months ago
An MDA Approach to Tame Component Based Software Development
Abstract. The aim of this paper is to show how the Model Driven Architecture (MDA) can be used in relation with component based software engineering. A software component only exhi...
Jean-Marc Jézéquel, Olivier Defour, ...
GI
2003
Springer
15 years 8 months ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
GW
2003
Springer
157views Biometrics» more  GW 2003»
15 years 8 months ago
Multimodality and Gestures in the Teacher?s Communication
The paper presents a research on the multimodal communication of teachers in the classroom. The “musical score”, a procedure for the analysis of multimodal communication, is us...
Giorgio Merola, Isabella Poggi
HIPC
2003
Springer
15 years 8 months ago
POMA: Prioritized Overlay Multicast in Ad Hoc Environments
Abstract: Overlay Multicast networks in mobile ad-hoc environments have received much attention due to their increasing number of practical applications. Although overlay multicast...
Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Li Xi...
« Prev « First page 8325 / 8478 Last » Next »