Sciweavers

690 search results - page 113 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 10 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
145
Voted
OOPSLA
2009
Springer
15 years 10 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
FTDCS
2003
IEEE
15 years 9 months ago
Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing
Ubicomp applications are characterized as situationaware, frequently-and-ephemerally-communicated and QoS-properties-associated. Using middleware to provide multiple QoS support f...
Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In
CCS
2009
ACM
15 years 7 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
IUI
2011
ACM
14 years 6 months ago
Protractor3D: a closed-form solution to rotation-invariant 3D gestures
Protractor 3D is a gesture recognizer that extends the 2D touch screen gesture recognizer Protractor [8] to 3D gestures. It inherits many of Protractor’s desirable properties, s...
Sven G. Kratz, Michael Rohs