Sciweavers

2111 search results - page 188 / 423
» How to Program Pervasive Systems
Sort
View
214
Voted
ECAL
2007
Springer
15 years 9 months ago
Simulation of the Evolution of Aging: Effects of Aggression and Kin-Recognition
Current biological theory has no commonly accepted view on the phenomenon of aging. On the one hand it is considered as an inescapable degradation immanent to complex biological sy...
Svetlana Krivenko, Mikhail S. Burtsev
PLDI
2000
ACM
15 years 7 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
VL
1996
IEEE
130views Visual Languages» more  VL 1996»
15 years 7 months ago
Seeing Systolic Computations in a Video Game World
ToonTalkTM is a general-purpose concurrent programming system in which the source code is animated and the programming environment is like a me. Every abstract computational aspec...
Kenneth M. Kahn
JALC
2006
125views more  JALC 2006»
15 years 3 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
202
Voted
ECOOP
1998
Springer
15 years 7 months ago
Synthesizing Object-Oriented and Functional Design to Promote Re-Use
Many problems require recursively speci ed types ofdata and a collection of tools that operate on those data. Over time, these problems evolve so that the programmer must extend t...
Shriram Krishnamurthi, Matthias Felleisen, Daniel ...