Sciweavers

4281 search results - page 674 / 857
» How to Disembed a Program
Sort
View
ICTCS
2005
Springer
15 years 6 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICWE
2005
Springer
15 years 6 months ago
Separation of Navigation Routing Code in J2EE Web Applications
The navigation routing code of a web application is the part of the code involved in routing a request from a web page through the appropriate components on the server, typically e...
Minmin Han, Christine Hofmeister
PKDD
2005
Springer
153views Data Mining» more  PKDD 2005»
15 years 6 months ago
A Quantitative Comparison of the Subgraph Miners MoFa, gSpan, FFSM, and Gaston
Abstract. Several new miners for frequent subgraphs have been published recently. Whereas new approaches are presented in detail, the quantitative evaluations are often of limited ...
Marc Wörlein, Thorsten Meinl, Ingrid Fischer,...
SAS
2005
Springer
15 years 6 months ago
A Generic Framework for Interprocedural Analysis of Numerical Properties
Abstract. In his seminal paper [5], Granger presents an analysis which infers linear congruence relations between integer variables. For affine programs without guards, his analys...
Markus Müller-Olm, Helmut Seidl
SERA
2005
Springer
15 years 6 months ago
MADL: Meta Architecture Description Language
: The techniques of meta-modeling and meta-levels have become a mature concept and have been largely used to solve real problems in programming languages, distributed environments,...
Adel Smeda, Mourad Oussalah, Tahar Khammaci