Sciweavers

115 search results - page 17 / 23
» The Attributed Pi Calculus
Sort
View
AAAI
2007
15 years 9 days ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl
FUIN
2008
100views more  FUIN 2008»
14 years 10 months ago
Alias Types and Effects for "Environment-aware" Computations
We adapt the alias type technology to deal with primitives supporting environmentawareness (that is, the ability to adapt the behavior of according to the capabilities of the envi...
Ferruccio Damiani, Elena Giachino, Paola Giannini
FOSSACS
2005
Springer
15 years 3 months ago
Mathematical Models of Computational and Combinatorial Structures
The general aim of this talk is to advocate a combinatorial perspective, together with its methods, in the investigation and study of models of computation structures. This, of cou...
Marcelo P. Fiore
SSDBM
2009
IEEE
119views Database» more  SSDBM 2009»
15 years 4 months ago
Identifying the Most Endangered Objects from Spatial Datasets
Abstract. Real-life spatial objects are usually described by their geographic locations (e.g., longitude and latitude), and multiple quality attributes. Conventionally, spatial dat...
Hua Lu, Man Lung Yiu
TGC
2007
Springer
15 years 4 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely