Sciweavers

3256 search results - page 448 / 652
» Mixin-Based Programming in C
Sort
View
ASPLOS
2009
ACM
14 years 11 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
CADE
2002
Springer
14 years 10 months ago
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code
Abstract. Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In the original approach to PCC, the safety policy inc...
Robert R. Schneck, George C. Necula
ICSE
2005
IEEE-ACM
14 years 10 months ago
Data structure repair using goal-directed reasoning
Data structure repair is a promising technique for enabling programs to execute successfully in the presence of otherwise fatal data structure corruption errors. Previous research...
Brian Demsky, Martin C. Rinard
ESORICS
2002
Springer
14 years 10 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
PERCOM
2007
ACM
14 years 10 months ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan