Sciweavers

555 search results - page 37 / 111
» Execution levels for aspect-oriented programming
Sort
View
CC
2001
Springer
177views System Software» more  CC 2001»
14 years 3 days ago
Imperative Program Transformation by Rewriting
Abstract. We present a method of specifying standard imperative program optimisations as a rewrite system. To achieve this we have extended the idea of matching sub-terms in expres...
David Lacey, Oege de Moor
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 5 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 1 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
IEEEINTERACT
2002
IEEE
14 years 16 days ago
On the Predictability of Program Behavior Using Different Input Data Sets
Smaller input data sets such as the test and the train input sets are commonly used in simulation to estimate the impact of architecture/micro-architecture features on the perform...
Wei-Chung Hsu, Howard Chen, Pen-Chung Yew, Dong-yu...
OTM
2007
Springer
14 years 1 months ago
Building Adaptive Systems with Service Composition Frameworks
Frameworks that support the implementation and execution of service compositions are a fundamental component of middleware infrastructures that support the design of adaptive syste...
Liliana Rosa, Luís Rodrigues, Antóni...