Sciweavers

2777 search results - page 193 / 556
» Example centric programming
Sort
View
237
Voted
POPL
2001
ACM
16 years 1 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
88
Voted
ICSE
2007
IEEE-ACM
16 years 27 days ago
SCL: Static Enforcement and Exploration of Developer Intent in Source Code
Developers are often unaware of, or fail to respect, the intentions behind a design due to poor communication of design intent. SCL (Structural Constraint Language) helps develope...
Daqing Hou
97
Voted
CCA
2009
Springer
15 years 7 months ago
Realisability and Adequacy for (Co)induction
Abstract. We prove the correctness of a formalised realisability interpretation of extensions of first-order theories by inductive and coinductive definitions in an untyped λ-ca...
Ulrich Berger
IDEAS
2003
IEEE
120views Database» more  IDEAS 2003»
15 years 6 months ago
A Framework for Customisable Schema Evolution in Object-Oriented Databases
This paper describes an evolution framework supporting customisation of the schema evolution and instance adaptation approaches in an object database management system. The framew...
Awais Rashid
ISIPTA
2003
IEEE
124views Mathematics» more  ISIPTA 2003»
15 years 6 months ago
Decision Making with Imprecise Second-Order Probabilities
In this paper we consider decision making under hierarchical imprecise uncertainty models and derive general algorithms to determine optimal actions. Numerical examples illustrate...
Lev V. Utkin