Sciweavers

2513 search results - page 278 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
136
Voted
EMSOFT
2006
Springer
15 years 4 months ago
Scheduling-independent threads and exceptions in SHIM
Concurrent programming languages should be a good fit for embedded systems because they match the intrinsic parallelism of their architectures and environments. Unfortunately, typ...
Olivier Tardieu, Stephen A. Edwards
118
Voted
CC
2008
Springer
124views System Software» more  CC 2008»
15 years 3 months ago
Coqa: Concurrent Objects with Quantized Atomicity
This paper introduces a new language model, Coqa, for deeply embedding concurrent programming into objects. Every program written in our language has the desirable behaviors of ato...
Yu David Liu, Xiaoqi Lu, Scott F. Smith
ER
2008
Springer
136views Database» more  ER 2008»
15 years 2 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
CSDA
2007
128views more  CSDA 2007»
15 years 1 months ago
Computational methods for case-cohort studies
Computational methods, which can be implemented using standard Cox regression software, are given for fitting “exact” pseudolikehood estimates and robust and asymptotic varia...
Bryan Langholz, Jenny Jiao
87
Voted
ISF
2002
107views more  ISF 2002»
15 years 22 days ago
A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior
Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the...
Nicolae B. Szirbik