Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: magazinearticle
|
Trespass, nuisance, and spam: 11th century common law meets the internetAALBERTS, Robert J ; POON, Percy S ; THISTLE, Paul DCommunications of the ACM, 2007-12, Vol.50 (12), p.40-45New York, NY: Association for Computing MachineryTexto completo disponível |
|
2 |
Material Type: magazinearticle
|
Quantum MoneyAARONSON, Scott ; FARHI, Edward ; GOSSET, David ; HASSIDIM, Avinatan ; KELNER, Jonathan ; LUTOMIRSKI, AndrewCommunications of the ACM, 2012-08, Vol.55 (8), p.84-92New York, NY: Association for Computing MachineryTexto completo disponível |
|
3 |
Material Type: Artigo
|
Aurora: a new model and architecture for data stream managementABADI, Daniel J ; CARNEY, Don ; CETINTEMEL, Ugur ; CHERNIACK, Mitch ; CONVEY, Christian ; SANGDON LEE ; STONEBRAKER, Michael ; TATBUL, Nesime ; ZDONIK, StanThe VLDB journal, 2003-08, Vol.12 (2), p.120-139Heidelberg: SpringerTexto completo disponível |
|
4 |
Material Type: Artigo
|
Nonclausal deduction in first-order temporal logicABADI, M ; MANNA, ZJournal of the ACM, 1990-04, Vol.37 (2), p.279-317 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
|
5 |
Material Type: Artigo
|
Semantics of transactional memory and automatic mutual exclusionAbadi, Martín ; Birrell, Andrew ; Harris, Tim ; Isard, MichaelSIGPLAN notices, 2008-01, Vol.43 (1), p.63-74Texto completo disponível |
|
6 |
Material Type: Artigo
|
Semantics of Transactional Memory and Automatic Mutual ExclusionABADI, Martín ; BIRRELL, Andrew ; HARRIS, Tim ; ISARD, MichaelACM transactions on programming languages and systems, 2011, Vol.33 (1), p.1-50 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
|
7 |
Material Type: Artigo
|
Analyzing security protocols with secrecy types and logic programsABADI, Martin ; BLANCHET, BrunoJournal of the ACM, 2005, Vol.52 (1), p.102-146 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
|
8 |
Material Type: Ata de Congresso
|
Computer-assisted verification of a protocol for certified emailAbadi, Martín ; Blanchet, Bruno Cousot, RadhiaLecture notes in computer science, 2003, p.316-335 [Periódico revisado por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponível |
|
9 |
Material Type: Artigo
|
A calculus for access control in distributed systemsAbadi, Martín ; Burrows, Michael ; Lampson, Butler ; Plotkin, GordonACM transactions on programming languages and systems, 1993-09, Vol.15 (4), p.706-734 [Periódico revisado por pares]New York, NY, USA: ACMTexto completo disponível |
|
10 |
Material Type: Artigo
|
On subtyping and matchingAbadi, Martín ; Cardelli, LucaACM transactions on programming languages and systems, 1996-07, Vol.18 (4), p.401-423 [Periódico revisado por pares]New York, NY, USA: ACMTexto completo disponível |