Sciweavers

856 search results - page 84 / 172
» Dependent Types in Practical Programming
Sort
View
ESOP
2005
Springer
14 years 2 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
DAGSTUHL
2001
13 years 10 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
BMCBI
2005
101views more  BMCBI 2005»
13 years 8 months ago
PALSSE: A program to delineate linear secondary structural elements from protein structures
Background: The majority of residues in protein structures are involved in the formation of helices and -strands. These distinctive secondary structure patterns can be used to rep...
Indraneel Majumdar, S. Sri Krishna, Nick V. Grishi...
CPAIOR
2007
Springer
14 years 3 months ago
Cost-Bounded Binary Decision Diagrams for 0-1 Programming
Abstract. In recent work binary decision diagrams (BDDs) were introduced as a technique for postoptimality analysis for integer programming. In this paper we show that much smaller...
Tarik Hadzic, John N. Hooker
APLAS
2010
ACM
13 years 9 months ago
Model Independent Order Relations for Processes
Semantic preorders between processes are usually applied in practice to model approximation or implementation relationships. For interactive models these preorders depend crucially...
Chaodong He