Sciweavers

890 search results - page 42 / 178
» Programming language methods in computer security
Sort
View
101
Voted
DBPL
2009
Springer
131views Database» more  DBPL 2009»
15 years 7 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...
97
Voted
SAS
2004
Springer
134views Formal Methods» more  SAS 2004»
15 years 5 months ago
Towards Declarative Programming for Web Services
ness Refinement in Abstract Symbolic Trajectory Evaluation . . . . 38 Mila Dalla Preda Constraint-Based Linear-Relations Analysis . . . . . . . . . . . . . . . . . . . . . . . . ....
Sheila A. McIlraith
120
Voted
MEMOCODE
2010
IEEE
14 years 10 months ago
Compilation of imperative synchronous programs with refined clocks
To overcome over-synchronization in synchronous programs, we recently introduced clock refinement to our synchronous programming language Quartz. This extension basically allows p...
Mike Gemunde, Jens Brandt, Klaus Schneider
DALT
2005
Springer
15 years 6 months ago
Modelling Uncertainty in Agent Programming
Existing cognitive agent programming languages that are based on the BDI model employ logical representation and reasoning for implementing the beliefs of agents. In these programm...
Johan Kwisthout, Mehdi Dastani
105
Voted
SAC
2009
ACM
15 years 7 months ago
Matching ThisType to subtyping
The notion of ThisType has been proposed to promote typesafe reuse of binary methods and recently extended to mutually recursive definitions. It is well-known, however, that This...
Chieri Saito, Atsushi Igarashi