Sciweavers

856 search results - page 74 / 172
» Design Guidance through the Controlled Application of Constr...
Sort
View
SOSP
2009
ACM
14 years 5 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
COMCOM
2008
131views more  COMCOM 2008»
13 years 9 months ago
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
In this paper, we present Collaborative Opportunistic Recovery Algorithm (CORA) designed for multicast multimedia applications with low loss as well as latency constraints in ad h...
Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Pa...
GECCO
2010
Springer
214views Optimization» more  GECCO 2010»
14 years 19 days ago
Mixed-integer evolution strategy using multiobjective selection applied to warehouse design optimization
This paper reports about the application of a new variant of multiobjective Mixed-Integer Evolution Strategy to a warehouse design optimization problem. The algorithm is able to d...
Edgar Reehuis, Thomas Bäck
GECCO
2007
Springer
175views Optimization» more  GECCO 2007»
14 years 3 months ago
An evolutionary multiobjective approach to design highly non-linear Boolean functions
The proliferation of all kinds of devices with different security requirements and constraints, and the arms-race nature of the security problem are increasingly demanding the de...
Hernán E. Aguirre, Hiroyuki Okazaki, Yasush...
JTRES
2010
ACM
13 years 9 months ago
The design of SafeJML, a specification language for SCJ with support for WCET specification
Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear p...
Ghaith Haddad, Faraz Hussain, Gary T. Leavens