Sciweavers

1658 search results - page 185 / 332
» Implementing Bit-addressing with Specialization
Sort
View
FC
1998
Springer
96views Cryptology» more  FC 1998»
15 years 4 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
HYBRID
1998
Springer
15 years 4 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
GI
1997
Springer
15 years 4 months ago
Functional Object-Oriented Programming with Object-Gofer
Object-Gofer is a small, practical extension of the functional programming language Gofer incorporating the following ideas from the object-oriented community: objects and toplevel...
Wolfram Schulte, Klaus Achatz
VLDB
1993
ACM
97views Database» more  VLDB 1993»
15 years 4 months ago
Managing Derived Data in the Gaea Scientific DBMS
ract One important aspect of scientific data management is metadata management. Metadata is information about data (e.g., content, source, processing applied, precision). One kind ...
Nabil I. Hachem, Ke Qiu, Michael A. Gennert, Matth...
98
Voted
ICFP
2007
ACM
15 years 4 months ago
iTasks: executable specifications of interactive work flow systems for the web
In this paper we introduce the iTask system: a set of combinators to specify work flows in a pure functional language at a very high level of abstraction. Work flow systems are au...
Rinus Plasmeijer, Peter Achten, Pieter W. M. Koopm...