Sciweavers

2960 search results - page 527 / 592
» The Culture Based Model: Constructing a Model of Culture
Sort
View
88
Voted
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 4 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ECOOP
1993
Springer
15 years 4 months ago
Nested Mixin-Methods in Agora
: Mixin-based inheritance is an inheritance technique that has been shown to subsume a variety of different inheritance mechanisms. It is based directly upon an incremental modific...
Patrick Steyaert, Wim Codenie, Theo D'Hondt, Koen ...
ESORICS
1994
Springer
15 years 4 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
GIS
1992
ACM
15 years 4 months ago
Machine Induction of Geospatial Knowledge
Machine learning techniques such as tree induction have become accepted tools for developing generalisations of large data sets, typically for use with production rule systems in p...
Peter A. Whigham, Robert I. McKay, J. R. Davis
POPL
1990
ACM
15 years 4 months ago
Higher-Order Modules and the Phase Distinction
Typed -calculus is an important tool in programming language research because it provides an extensible framework for studying language features both in isolation and in their rel...
Robert Harper, John C. Mitchell, Eugenio Moggi