Sciweavers

8008 search results - page 1461 / 1602
» Computer-Aided Language Processing
Sort
View
AOSD
2007
ACM
15 years 2 months ago
A machine code model for efficient advice dispatch
The primary implementations of AspectJ to date are based on a compile- or load-time weaving process that produces Java byte code. Although this implementation strategy has been cr...
Ryan M. Golbeck, Gregor Kiczales
ASSETS
2007
ACM
15 years 2 months ago
SIBYLLE: a system for alternative communication adapting to the context and its user
In this paper, we describe the latest version of SIBYLLE, an AAC system that permits persons suffering from severe physical disabilities to enter text with any computer applicatio...
Tonio Wandmacher, Jean-Yves Antoine, Franck Poirie...
ASYNC
2007
IEEE
129views Hardware» more  ASYNC 2007»
15 years 2 months ago
Formal Verification of CHP Specifications with CADP Illustration on an Asynchronous Network-on-Chip
Few formal verification techniques are currently available for asynchronous designs. In this paper, we describe a new approach for the formal verification of asynchronous architec...
Gwen Salaün, Wendelin Serwe, Yvain Thonnart, ...
ATAL
2007
Springer
15 years 2 months ago
A methodology for 3D electronic institutions
In this paper we propose a methodology for the construction of 3D electronic institutions. 3D electronic institutions are normative environments where software and human agents ca...
Anton Bogdanovych, Marc Esteva, Simeon J. Simoff, ...
COMPSAC
2007
IEEE
15 years 1 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
« Prev « First page 1461 / 1602 Last » Next »