Sciweavers

1715 search results - page 304 / 343
» Domain-Specific Program Checking
Sort
View
ISSTA
2004
ACM
14 years 1 months ago
Faster constraint solving with subtypes
Constraints in predicate or relational logic can be translated into boolean logic and solved with a SAT solver. For faster solving, it is common to exploit the typing of predicate...
Jonathan Edwards, Daniel Jackson, Emina Torlak, Vi...
SC
2004
ACM
14 years 1 months ago
Assessing Fault Sensitivity in MPI Applications
Today, clusters built from commodity PCs dominate high-performance computing, with systems containing thousands of processors now being deployed. As node counts for multi-teraflo...
Charng-da Lu, Daniel A. Reed
SIGDOC
2004
ACM
14 years 1 months ago
Liability for defective content
Software publishers and information service providers publish information about their own products and about other products and people. Additional content might be incidental, suc...
Cem Kaner
CASSIS
2004
Springer
14 years 1 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
CCS
2004
ACM
14 years 1 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii