Sciweavers

1748 search results - page 153 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
CATA
2003
15 years 4 months ago
A Restaurant Finder using Belief-Desire-Intention Agent Model and Java Technology
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...
Dongqing Lin, Thomas P. Wiggen, Chang-Hyun Jo
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 10 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
USS
2008
15 years 5 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
ICLP
2009
Springer
15 years 9 months ago
An Engine for Computing Well-Founded Models
The seemingly simple choice of whether to use call variance or call subsumption in a tabled evaluation deeply affects an evaluation’s properties. Most tabling implementations hav...
Terrance Swift
CORR
2010
Springer
180views Education» more  CORR 2010»
15 years 14 days ago
XSB: Extending Prolog with Tabled Logic Programming
The paradigm of Tabled Logic Programming (TLP) is now supported by a number of Prolog systems, including XSB, YAP Prolog, B-Prolog, Mercury, ALS, and Ciao. The reasons for this ar...
Terrance Swift, David Scott Warren