Sciweavers

1054 search results - page 49 / 211
» Guarded Expressions in Practice
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 8 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
SAS
2007
Springer
14 years 5 months ago
Refactoring Using Type Constraints
Type constraints express subtype-relationships between the types of program expressions that are required for type-correctness, and were originally proposed as a convenient framewo...
Frank Tip
ITICSE
2006
ACM
14 years 5 months ago
WADEIn II: a case for adaptive explanatory visualization
Adaptive explanatory visualization is an attempt to integrate two promising approaches to program visualization: adaptive visualization and explanatory visualization. The goal of ...
Peter Brusilovsky, Tomasz D. Loboda
EUROSYS
2009
ACM
14 years 8 months ago
User interactions in social networks and their implications
Social networks are popular platforms for interaction, communication and collaboration between friends. Researchers have recently proposed an emerging class of applications that l...
Christo Wilson, Bryce Boe, Alessandra Sala, Krishn...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 6 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...