Sciweavers

113 search results - page 20 / 23
» Complete involutive rewriting systems
Sort
View
WETICE
1997
IEEE
13 years 12 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
OOPSLA
2001
Springer
14 years 4 days ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
IJCAI
1989
13 years 8 months ago
Recognizing Unnecessary Inference
Intelligent reasoners sometimes draw conclusions that lack new or relevant information. Similarly, automated reasoning systems can produce formulas that are not necessary for the ...
Dan Benanav
ICFP
2007
ACM
13 years 11 months ago
iTasks: executable specifications of interactive work flow systems for the web
In this paper we introduce the iTask system: a set of combinators to specify work flows in a pure functional language at a very high level of abstraction. Work flow systems are au...
Rinus Plasmeijer, Peter Achten, Pieter W. M. Koopm...