Sciweavers

3872 search results - page 208 / 775
» The Java memory model
Sort
View
POLICY
2007
Springer
15 years 9 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
COOPIS
1998
IEEE
15 years 7 months ago
Jedi: Extracting and Synthesizing Information from the Web
Jedi (Java based Extraction and Dissemination of Information) is a lightweight tool for the creation of wrappers and mediators to extract, combine, and reconcile information from ...
Gerald Huck, Peter Fankhauser, Karl Aberer, Erich ...
SIGSOFT
1998
ACM
15 years 7 months ago
On-Line Change Mechanisms
Our interest in the eld of software architecture is focused on the application in technical systems, such as control systems. Our current research in this eld is centered around a...
Sylvia Stuurman, Jan van Katwijk
WSC
2001
15 years 4 months ago
A framework for distributed simulation optimization
The system presented bridges the gap between three different research areas: discrete event simulation, heuristic optimization methods and distributed systems technology. Its goal...
Björn Gehlsen, Bernd Page
ACL
2009
15 years 1 months ago
ProLiV - a Tool for Teaching by Viewing Computational Linguistics
ProLiV - Animated Process-modeler of Complex (Computational) Linguistic Methods and Theories - is a fully modular, flexible, XML-based stand-alone Java application, used for compu...
Monica Gavrila, Cristina Vertan