Sciweavers

1407 search results - page 141 / 282
» The Use of Overloading in Java Programs
Sort
View
ISSTA
2006
ACM
15 years 9 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
CC
2003
Springer
126views System Software» more  CC 2003»
15 years 8 months ago
Rapid and Robust Compiler Construction Using Template-Based Metacompilation
We have developed Tm, a template-based metacompiler. Given a set of data-structure definitions and a template, Tm generates files that instantiate the template for the given data...
Kees van Reeuwijk

Book
359views
17 years 1 months ago
C++ Annotations
"This document is intended for knowledgeable users of C (or any other language using a C-like grammar, like Perl or Java) who would like to know more about, or make the transi...
Frank B. Brokken
CHI
2000
ACM
15 years 7 months ago
Alice: lessons learned from building a 3D system for novices
We present lessons learned from developing Alice, a 3D graphics programming environment designed for undergraduates with no 3D graphics or programming experience. Alice is a Windo...
Matthew Conway, Steve Audia, Tommy Burnette, Denni...
FMOODS
2007
15 years 4 months ago
Verifying Distributed, Event-Based Middleware Applications Using Domain-Specific Software Model Checking
The success of distributed event-based infrastructures such as SIENA and Elvin is partially due to their ease of use. Even novice users of these infrastructures not versed in distr...
L. Ruhai Cai, Jeremy S. Bradbury, Jürgen Ding...