Sciweavers

4719 search results - page 518 / 944
» Spreadsheet functional programming
Sort
View
137
Voted
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
15 years 10 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
132
Voted
ESOP
2005
Springer
15 years 10 months ago
Interprocedural Herbrand Equalities
We present an aggressive interprocedural analysis for inferring value equalities which are independent of the concrete interpretation of the operator symbols. These equalities, cal...
Markus Müller-Olm, Helmut Seidl, Bernhard Ste...
139
Voted
ARGMAS
2004
Springer
15 years 10 months ago
Negotiation Among DDeLP Agents
Negotiation can be conceived as the exchange of messages among self-interested agents in order to settle on an agreement over a given issue. They decide which messages to send acco...
Fernando A. Tohmé, Guillermo Ricardo Simari
141
Voted
CD
2004
Springer
15 years 10 months ago
Customizing Component-Based Architectures by Contract
This paper presents an approach to describe, deploy and manage component-based applications having dynamic functional and non-functional requirements. The approach is centered on a...
Orlando Loques, Alexandre Sztajnberg
144
Voted
CD
2004
Springer
15 years 10 months ago
Eureka - A Resource Discovery Service for Component Deployment
Abstract. Component orientation is a current trend for creating modern applications. The concept of a component is broad and includes plugins and other units of modularization. Typ...
Karl Pauls, Richard S. Hall