Sciweavers

6141 search results - page 8 / 1229
» Models and representation of their ownership
Sort
View
PLDI
2003
ACM
14 years 4 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
ICFP
2008
ACM
14 years 11 months ago
Functional translation of a calculus of capabilities
Reasoning about imperative programs requires the ability to track aliasing and ownership properties. We present a type system that provides this ability, by using regions, capabil...
Arthur Charguéraud, François Pottier
IPPS
2007
IEEE
14 years 5 months ago
Reifying Control of Multi-Owned Network Resources
Communication delay is a key source of uncertainty in distributed systems. Existing approaches to reduce this uncertainty focus on maintaining sufficient surplus bandwidth; appli...
Nadeem Jamali, Chen Liu
IPPS
2003
IEEE
14 years 4 months ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran
IJISEC
2006
88views more  IJISEC 2006»
13 years 11 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...