Flow-based programming

Results: 49



#Item
21Course outline 1.  Language-Based Security: motivation 2.  Language-Based Information-Flow Security: the big picture 3.  Dimensions and principles of declassification 4.  Dynamic vs. static security enforcement

Course outline 1.  Language-Based Security: motivation 2.  Language-Based Information-Flow Security: the big picture 3.  Dimensions and principles of declassification 4.  Dynamic vs. static security enforcement

Add to Reading List

Source URL: www.sti.uniurb.it

Language: English - Date: 2014-09-11 02:40:15
22Proceedings of the 2003 Conference on New Interfaces for Musical Expression (NIME-03), Montreal, Canada  Dsp.rack: Laptop-based Modular, Programmable Digital Signal Processing and Mixing for Live Performance William Klei

Proceedings of the 2003 Conference on New Interfaces for Musical Expression (NIME-03), Montreal, Canada Dsp.rack: Laptop-based Modular, Programmable Digital Signal Processing and Mixing for Live Performance William Klei

Add to Reading List

Source URL: www.music.mcgill.ca

Language: English - Date: 2003-05-20 15:14:25
23Discovering Faults in Idiom-Based Exception Handling Magiel Bruntink Arie van Deursen  Tom Tourwe´

Discovering Faults in Idiom-Based Exception Handling Magiel Bruntink Arie van Deursen Tom Tourwe´

Add to Reading List

Source URL: www.st.ewi.tudelft.nl

Language: English - Date: 2009-11-26 15:59:20
24Practical Memory Leak Detection using Guarded Value-Flow Analysis ∗ Sigmund Cherem Lonnie Princehouse

Practical Memory Leak Detection using Guarded Value-Flow Analysis ∗ Sigmund Cherem Lonnie Princehouse

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-06-11 17:19:00
25Spring® 3 and Spring Web Flow 2.1 This course is a new course based on the Spring 3 release. It includes complete coverage of the annotation based approach to configuration and the use of Java-5 capabilities that was fi

Spring® 3 and Spring Web Flow 2.1 This course is a new course based on the Spring 3 release. It includes complete coverage of the annotation based approach to configuration and the use of Java-5 capabilities that was fi

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2010-07-23 16:56:23
26USING CONSTRAINTS TO ACHIEVE STABILITY IN AUTOMATIC GRAPH LAYOUT ALGORITHMS  Karl-Friedrich B ohringer

USING CONSTRAINTS TO ACHIEVE STABILITY IN AUTOMATIC GRAPH LAYOUT ALGORITHMS  Karl-Friedrich B ohringer

Add to Reading List

Source URL: www.ee.washington.edu

Language: English - Date: 2003-07-05 01:09:00
27Language-Based Security for Malicious Mobile Code Fred B. Schneider [removed] Dexter Kozen [removed]

Language-Based Security for Malicious Mobile Code Fred B. Schneider [removed] Dexter Kozen [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-07-08 16:43:04
28Object Flow Analysis — Taking an Object-Centric View on Dynamic Analysis? Adrian Lienhard1 , St´ephane Ducasse2 , Tudor Gˆırba1 1  Software Composition Group, University of Bern, Switzerland

Object Flow Analysis — Taking an Object-Centric View on Dynamic Analysis? Adrian Lienhard1 , St´ephane Ducasse2 , Tudor Gˆırba1 1 Software Composition Group, University of Bern, Switzerland

Add to Reading List

Source URL: scg.unibe.ch

Language: English - Date: 2008-04-01 08:17:40
29Microsoft Word - cover_worlds.doc

Microsoft Word - cover_worlds.doc

Add to Reading List

Source URL: www.vpri.org

Language: English - Date: 2015-01-21 19:16:01
30Stream Reasoning in DyKnow: A Knowledge Processing Middleware System? Fredrik Heintz, Jonas Kvarnstr¨om, and Patrick Doherty {frehe, jonkv, patdo}@ida.liu.se Dept. of Computer and Information Science Link¨oping Univers

Stream Reasoning in DyKnow: A Knowledge Processing Middleware System? Fredrik Heintz, Jonas Kvarnstr¨om, and Patrick Doherty {frehe, jonkv, patdo}@ida.liu.se Dept. of Computer and Information Science Link¨oping Univers

Add to Reading List

Source URL: www.ida.liu.se

Language: English - Date: 2011-05-25 05:58:43