Sciweavers

1675 search results - page 107 / 335
» Some thoughts on teaching programming and programming langua...
Sort
View
SIGADA
1997
Springer
15 years 8 months ago
Transitioning to Ada in an Introductory Course for Non-Majors
All students attending the U.S. Air Force Academy are required to take an introductory course in computer science. Last year we transitioned to Ada in this course. In this paper w...
A. T. Chamillard, William C. Hobart Jr.
ICFP
2006
ACM
16 years 4 months ago
Access control in a core calculus of dependency
The Dependency Core Calculus (DCC) is an extension of the computational lambda calculus that was designed in order to capture the notion of dependency that arises in information-f...
Martín Abadi
ICALP
2009
Springer
15 years 9 months ago
Decidability of the Guarded Fragment with the Transitive Closure
We consider an extension of the guarded fragment in which one can guard quantiers using the transitive closure of some binary relations. The obtained logic captures the guarded fr...
Jakub Michaliszyn
IFIP
1998
Springer
15 years 8 months ago
Security Requirements for Mobile Agents in Electronic Markets
Abstract. In this article we identify security threats and requirements for software agent systems in the context of an electronic market. A short description of our own agent syst...
Michael Zapf, Helge Müller, Kurt Geihs
ICALP
2009
Springer
15 years 8 months ago
Efficient Methods for Selfish Network Design
Intuitively, Braess's paradox states that destroying a part of a network may improve the common latency of selfish flows at Nash equilibrium. Such a paradox is a pervasive phe...
Dimitris Fotakis, Alexis C. Kaporis, Paul G. Spira...