Sciweavers

5790 search results - page 250 / 1158
» Distributed programming with distributed authorization
Sort
View
IPPS
1994
IEEE
15 years 7 months ago
Toward Flexible Control of the Temporal Mapping from Concurrent Program Events to Animations
As parallel and distributed computers become more widely available and used, the already important process of understanding and debugging concurrent programs will take on even gre...
Eileen Kraemer, John T. Stasko
CCS
2009
ACM
16 years 3 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
PERCOM
2004
ACM
16 years 2 months ago
Programming Pervasive and Mobile Computing Applications with the TOTA Middleware
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
Marco Mamei, Franco Zambonelli
ISORC
2002
IEEE
15 years 8 months ago
Commanding and Reactive Control of Peripherals in the TMO Programming Scheme
: Although high-level real-time distributed computing objects are generally written in forms independent of execution platforms, input and output (I/O) activities involving periphe...
K. H. Kim
WFLP
2000
Springer
163views Algorithms» more  WFLP 2000»
15 years 6 months ago
Cooperative Constraint Functional Logic Programming
We describe the current status of the development of CFLP, a system which aims at the integration of the best features of functional logic programming (FLP), cooperative constrain...
Mircea Marin, Tetsuo Ida