Sciweavers

1818 search results - page 198 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
123
Voted
TAPOS
1998
83views more  TAPOS 1998»
15 years 3 months ago
A Structured Text ADT for Object-Relational Databases
There is a growing need, both for use within corporate intranets and within the rapidly evolving World Wide Web, to develop tools that are able to retrieve relevant textual inform...
L. J. Brown, Mariano P. Consens, Ian J. Davis, Chr...
124
Voted
ICTAC
2010
Springer
15 years 2 months ago
A Modality for Safe Resource Sharing and Code Reentrancy
Abstract. The potential of linear logic in facilitating reasoning on resource usage has long been recognized. However, convincing uses of linear types in practical programming are ...
Rui Shi, Dengping Zhu, Hongwei Xi
116
Voted
TCS
2010
15 years 2 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
150
Voted
TDSC
2010
101views more  TDSC 2010»
15 years 2 months ago
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
—This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines ...
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan ...
LPAR
2010
Springer
15 years 1 months ago
Verifying Pointer and String Analyses with Region Type Systems
Pointer analysis statically approximates the heap pointer structure during a program execution in order to track heap objects or to establish alias relations between references, a...
Lennart Beringer, Robert Grabowski, Martin Hofmann