Sciweavers

1700 search results - page 34 / 340
» Specifying and implementing refactorings
Sort
View
ACISP
1997
Springer
15 years 4 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
AUSAI
2006
Springer
15 years 3 months ago
Hardware Implementation of Temporal Nonmonotonic Logics
Abstract. In order to apply nonmonotonic logics for specifying industrial automation controllers, we define (1) a method to extend atemporal nonmonotonic logics with temporal opera...
Insu Song, Guido Governatori
AMAST
2008
Springer
15 years 1 months ago
Implementing a Categorical Information System
The authors have proposed using category-theoretic sketches to enhance database design and integration methodologies. The algebraic context is called the Sketch Data Model (SkDM) a...
Michael Johnson, Robert D. Rosebrugh
EV
2008
86views Hardware» more  EV 2008»
15 years 1 months ago
Long-term Retention in E-Voting - Legal Requirements and Technical Implementation
: Legally binding elections require retention of specified election data such as balloting material. This applies to paper-based as well as electronic elections. However, in German...
Rotraud Gitter, Lucie Langer, Susanne Okunick, Zoi...
ECEASST
2008
82views more  ECEASST 2008»
14 years 12 months ago
Interaction nets: programming language design and implementation
: This paper presents a compiler for interaction nets, which, just like term rewriting systems, are user-definable rewrite systems which offer the ability to specify and program. I...
Abubakar Hassan, Ian Mackie, Shinya Sato