Sciweavers

10575 search results - page 1955 / 2115
» Programming Languages
Sort
View
84
Voted
ESORICS
2000
Springer
15 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
IWMM
2000
Springer
137views Hardware» more  IWMM 2000»
15 years 1 months ago
Cycles to Recycle: Garbage Collection on the IA-64
The IA-64, Intel's 64-bit instruction set architecture, exhibits a number of interesting architectural features. Here we consider those features as they relate to supporting ...
Richard L. Hudson, J. Eliot B. Moss, Sreenivas Sub...
ICSE
1995
IEEE-ACM
15 years 1 months ago
Architectural Mismatch or Why It's Hard to Build Systems Out Of Existing Parts
Many would argue that future breakthroughs in software productivity will dependon our ability to combine existing pieces of software to produce new applications. An important step...
David Garlan, Robert Allen, John Ockerbloom
DBPL
1991
Springer
66views Database» more  DBPL 1991»
15 years 1 months ago
Rationale and Design of BULK
BULK is a very-high-level persistent programming language and environment for prototyping and implementing database applications. BULK provides sets and sequences as primitive typ...
Steve Rozen, Dennis Shasha
ECAIW
1994
Springer
15 years 1 months ago
Representing and Executing Agent-Based Systems
Abstract. In this paper we describe an approach to the representation and implementation of agent-based systems where the behaviour of an individual agent is represented by a set o...
Michael Fisher
« Prev « First page 1955 / 2115 Last » Next »