Sciweavers

7715 search results - page 1186 / 1543
» Visual Rules Modeling
Sort
View
COORDINATION
2000
Springer
15 years 9 months ago
Scripting Coordination Styles
Abstract. The fact that so many different kinds of coordination models and languages have been proposed suggests that no one single approach will be the best for all coordination p...
Franz Achermann, Stefan Kneubuehl, Oscar Nierstras...
CSL
2000
Springer
15 years 9 months ago
Subtyping with Power Types
This paper introduces a typed λ-calculus called λPower , a predicative reformulation of part of Cardelli’s power type system. Power types integrate subtyping into the typing t...
David Aspinall
POPL
1999
ACM
15 years 9 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
153
Voted
LICS
1999
IEEE
15 years 9 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
163
Voted
AMET
1998
Springer
15 years 8 months ago
Evolutionary Computing and Negotiating Agents
Automated negotiation has been of particular interest due to the relevant role that negotiation plays among trading agents. This paper presents two types of agent architecture: Cas...
Noyda Matos, Carles Sierra
« Prev « First page 1186 / 1543 Last » Next »