Sciweavers

1183 search results - page 160 / 237
» On flow-sensitive security types
Sort
View
ESORICS
2003
Springer
15 years 9 months ago
A Toolkit for Managing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
Michael Backes, Birgit Pfitzmann, Matthias Schunte...
AGENTS
2001
Springer
15 years 8 months ago
A shopper's assistant
Shopping on the Internet has become a convenient way of purchasing commodities of choice. A key contribution of agent technology will be to develop personal agents that can assist...
Partha Sarathi Dutta, Sandip Debnath, Sandip Sen
144
Voted
AGENTS
2001
Springer
15 years 8 months ago
Intelligent agents for an artificial market system
This paper describes an agent-based artificial market system whose underlying interaction protocols provide advanced features. Using the system, actors (i.e., customers and mercha...
Nikos I. Karacapilidis, Pavlos Moraitis
AGENTS
2001
Springer
15 years 8 months ago
Is the wolf angry or ... just hungry?
In this paper we will discuss different types of control over synthetic characters in interactive stories. We will argue that, to attain a deeper and more engaging control, in ce...
Isabel Machado, Ana Paiva, Rui Prada
OOPSLA
2001
Springer
15 years 8 months ago
Contract Soundness for Object-Oriented Languages
Checking pre- and post-conditions of procedures and methods at runtime helps improve software reliability. In the procedural world, pre- and post-conditions have a straightforward...
Robert Bruce Findler, Matthias Felleisen