Sciweavers

1052 search results - page 94 / 211
» Understanding POWER multiprocessors
Sort
View
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 10 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
VISSOFT
2002
IEEE
15 years 10 months ago
Visualization of Component-based Software
New component-based techniques are emerging, leading to new ways to develop software. Industrial component technologies such as COM, JavaBeans, EJB, or CCM are powerful but their ...
Jean-Marie Favre, Humberto Cervantes
ESOP
2001
Springer
15 years 9 months ago
Secure Information Flow and CPS
Security-typed languages enforce confidentiality or integrity policies by type checking. This paper investigates continuation-passing style (CPS) translation of such languages as ...
Steve Zdancewic, Andrew C. Myers
126
Voted
ITICSE
1997
ACM
15 years 9 months ago
Recursion and grammars for CS2
A programming exercise on recursion in which students create drawings of simple and bracketed Lindenmayer Systems provides a context for exploring additional computer science conc...
Viera K. Proulx
134
Voted
CONCUR
1995
Springer
15 years 8 months ago
Characterizing Behavioural Congruences for Petri Nets
Abstract. We exploit a notion of interface for Petri nets in order to design a set of net combinators. For such a calculus of nets, we focus on the behavioural congruences arising ...
Mogens Nielsen, Lutz Priese, Vladimiro Sassone