Sciweavers

2111 search results - page 74 / 423
» How to Program Pervasive Systems
Sort
View
POPL
2000
ACM
15 years 5 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
98
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 18 days ago
Reducing Tile Complexity for Self-Assembly Through Temperature Programming
We consider the tile self-assembly model and how tile complexity can be eliminated by permitting the temperature of the self-assembly system to be adjusted throughout the assembly...
Ming-Yang Kao, Robert T. Schweller
201
Voted
VL
2010
IEEE
286views Visual Languages» more  VL 2010»
14 years 11 months ago
A Debugging Perspective on End-User Mashup Programming
In recent years, systems have emerged that enable end users to “mash” together existing web services to build new web sites. However, little is known about how well end users ...
Jill Cao, Kyle Rector, Thomas H. Park, Scott D. Fl...
HICSS
2009
IEEE
109views Biometrics» more  HICSS 2009»
15 years 7 months ago
The Construction of Peers and Artifacts: The Organizing Role of "Programming Guidelines"
In this paper, we1 study new organizational forms for production processes that emerge in large scale Free/Libre Open Source Software (FLOSS) projects. We will focus on the textua...
Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli
CONSTRAINTS
2004
116views more  CONSTRAINTS 2004»
15 years 12 days ago
Decision Tradeoff Using Example-Critiquing and Constraint Programming
We consider constructive preference elicitation for decision aid systems in applications such as configuration or electronic catalogs. We are particularly interested in supporting ...
Pearl Pu, Boi Faltings