Sciweavers

565 search results - page 73 / 113
» A (De)constructive Approach to Program Checking
Sort
View
ICALP
2001
Springer
14 years 1 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
ECOOP
2000
Springer
14 years 1 months ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews
CODES
1994
IEEE
14 years 24 days ago
Towards a declarative framework for hardware-software codesign
We present an experimental framework for mapping declarative programs, written in a language known as Ruby, into various combinations of hardware and software. Strategies for para...
Wayne Luk, Teddy Wu
VLDB
1992
ACM
83views Database» more  VLDB 1992»
14 years 21 days ago
A Performance Study of Alternative Object Faulting and Pointer Swizzling Strategies
This paper presents a portable, efficient method for accessing memory resident persistent objects in virtual memory in the context of the E programming language. Under the approac...
Seth J. White, David J. DeWitt
ACSC
2004
IEEE
14 years 12 days ago
Strength Reduction for Loop-Invariant Types
Types are fundamental for enforcing levels of abstraction in modern high-level programming languages and their lower-level representations. However, some type-related features suc...
Phung Hua Nguyen, Jingling Xue