Sciweavers

4702 search results - page 917 / 941
» How to Copyright a Function
Sort
View
105
Voted
CACM
2005
74views more  CACM 2005»
15 years 15 days ago
Separate handles from names on the internet
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. ...
Michael J. O'Donnell
CCR
2005
131views more  CCR 2005»
15 years 15 days ago
A clean slate 4D approach to network control and management
Today's data networks are surprisingly fragile and difficult to manage. We argue that the root of these problems lies in the complexity of the control and management planes--...
Albert G. Greenberg, Gísli Hjálmt&ya...
TSC
2008
144views more  TSC 2008»
15 years 15 days ago
Probabilistic QoS and Soft Contracts for Transaction-Based Web Services Orchestrations
Service level agreements (SLAs), or contracts, have an important role in web services. These contracts define the obligations and rights between the provider of a web service and i...
Sidney Rosario, Albert Benveniste, Stefan Haar, Cl...
111
Voted
TSE
2008
236views more  TSE 2008»
15 years 15 days ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
AIL
2004
107views more  AIL 2004»
15 years 15 days ago
AI and the Conquest of Complexity in Law
The paper identi es some of the problems with legal systems and outlines the potential of AI technology for overcoming them. For expository purposes, this outline is based on a si...
L. Bibel