Sciweavers

1411 search results - page 29 / 283
» A Value Analysis for C Programs
Sort
View
COOTS
1997
13 years 10 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
POPL
2001
ACM
14 years 9 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
MP
2002
48views more  MP 2002»
13 years 8 months ago
Maximum stable set formulations and heuristics based on continuous optimization
The stability number (G) for a given graph G is the size of a maximum stable set in G. The Lov
Samuel Burer, Renato D. C. Monteiro, Yin Zhang
ICCS
2003
Springer
14 years 1 months ago
A Compiler Approach to Performance Prediction Using Empirical-Based Modeling
Abstract. Performance understanding and prediction are extremely important goals for guiding the application of program optimizations or in helping programmers focus their efforts...
Pedro C. Diniz
CSFW
1999
IEEE
14 years 29 days ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...