Sciweavers

7124 search results - page 1221 / 1425
» Programming Languages and Operating Systems
Sort
View
SADFE
2008
IEEE
15 years 9 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
117
Voted
EDOC
2007
IEEE
15 years 9 months ago
Providing Support for Model Composition in Metamodels
In aspect-oriented modeling (AOM), a design is described using a set of design views. It is sometimes necessary to compose the views to obtain an integrated view that can be analy...
Robert B. France, Franck Fleurey, Raghu Reddy, Ben...
133
Voted
CONCUR
2007
Springer
15 years 9 months ago
Fair Cooperative Multithreading
Abstract. We propose a new operational model for shared variable concurrency, in the context of a concurrent, higher-order imperative language `a la ML. In our model the scheduling...
Gérard Boudol
122
Voted
WEBDB
2005
Springer
105views Database» more  WEBDB 2005»
15 years 8 months ago
On the Expressive Power of Node Construction in XQuery
In the relational model it has been shown that the flat relational algebra has the same expressive power as the nested relational algebra, as far as queries over flat relations ...
Wim Le Page, Jan Hidders, Philippe Michiels, Jan P...
ACSAC
2003
IEEE
15 years 8 months ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
« Prev « First page 1221 / 1425 Last » Next »