Sciweavers

306 search results - page 42 / 62
» NaturalJava: a natural language interface for programming in...
Sort
View
110
Voted
APPINF
2003
15 years 3 months ago
Localizing XML Documents through XSLT
Existing efforts on XML internationalization and localization have been focusing on the contents of XML documents instead of on the meta presentations such as tags and attributes...
Yijun Yu, Jianguo Lu, Jing-Hao Xue, Yi Zhang, Weiw...
SACMAT
2010
ACM
15 years 7 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
99
Voted
HICSS
1999
IEEE
125views Biometrics» more  HICSS 1999»
15 years 6 months ago
ASHRAM: Active Summarization and Markup
Typically, searching for information in a document collection amounts to refining a query and then scanning a large number of documents to determine their relevance. Active Summar...
Mary S. Neff, James W. Cooper
DLS
2009
196views Languages» more  DLS 2009»
15 years 5 days ago
Contracts for first-class modules
Behavioral software contracts express properties concerning the flow of values across component (modules, classes, etc) interfaces. These properties are often beyond the reach of ...
T. Stephen Strickland, Matthias Felleisen
182
Voted
POPL
2001
ACM
16 years 2 months ago
Oracle-based checking of untrusted software
We present a variant of Proof-Carrying Code (PCC) in which the trusted inference rules are represented as a higher-order logic program, the proof checker is replaced by a nondeter...
George C. Necula, Shree Prakash Rahul