Sciweavers

1448 search results - page 143 / 290
» From Requirements to Code Revisited
Sort
View
USENIX
2003
15 years 5 months ago
Using Read-Copy-Update Techniques for System V IPC in the Linux 2.5 Kernel
Read-copy update (RCU) allows lock-free read-only access to data structures that are concurrently modified on SMP systems. Despite the concurrent modifications, read-only access...
Andrea Arcangeli, Mingming Cao, Paul E. McKenney, ...
DIMVA
2009
15 years 5 months ago
Polymorphing Software by Randomizing Data Structure Layout
Abstract. This paper introduces a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts f...
Zhiqiang Lin, Ryan Riley, Dongyan Xu
INFSOF
2007
83views more  INFSOF 2007»
15 years 3 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
127
Voted
CN
2000
76views more  CN 2000»
15 years 3 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
ADAEUROPE
2010
Springer
15 years 2 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...