Sciweavers

2678 search results - page 476 / 536
» Operational Semantics of Transactions
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 5 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
107
Voted
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
15 years 5 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
CAISE
2006
Springer
15 years 5 months ago
A Method for Functional Alignment Verification in Hierarchical Enterprise Models
Enterprise modeling involves multiple domains of expertise: requirements engineering, business process modeling, IT development etc. Our experience has shown that hierarchical ente...
Irina Rychkova, Alain Wegmann
ECOOP
2006
Springer
15 years 5 months ago
Session Types for Object-Oriented Languages
A session takes place between two parties; after establishing a connection, each party interleaves local computations and communications (sending or receiving) with the other. Ses...
Mariangiola Dezani-Ciancaglini, Dimitris Mostrous,...
EDBTW
2006
Springer
15 years 5 months ago
Window Specification over Data Streams
Several query languages have been proposed for managing data streams in modern monitoring applications. Continuous queries expressed in these languages usually employ windowing con...
Kostas Patroumpas, Timos K. Sellis