Sciweavers

78 search results - page 14 / 16
» Beyond static and dynamic scope
Sort
View
ISCA
2000
IEEE
99views Hardware» more  ISCA 2000»
14 years 2 months ago
Transient fault detection via simultaneous multithreading
Smaller feature sizes, reduced voltage levels, higher transistor counts, and reduced noise margins make future generations of microprocessors increasingly prone to transient hardw...
Steven K. Reinhardt, Shubhendu S. Mukherjee
ICSE
2000
IEEE-ACM
14 years 1 months ago
Little-JIL/Juliette: a process definition language and interpreter
Little-JIL, a language for programming coordination in processes is an executable, high-level language with a formal (yet graphical) syntax and rigorously defined operational seTh...
Aaron G. Cass, Barbara Staudt Lerner, Stanley M. S...
POPL
2012
ACM
12 years 5 months ago
A type system for borrowing permissions
In object-oriented programming, unique permissions to object references are useful for checking correctness properties such as consistency of typestate and noninterference of conc...
Karl Naden, Robert Bocchino, Jonathan Aldrich, Kev...
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
14 years 3 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...