Sciweavers

6527 search results - page 140 / 1306
» On Typing Information Flow
Sort
View
CSFW
2000
IEEE
14 years 1 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
BCSHCI
2008
13 years 10 months ago
MECE method for categorising typing errors
This research aims to create an MECE (Mutually Exclusive, Collectively Exhaustive) categorisation method for typing errors. The research is grounded in theory by gathering typing ...
Akiyo Kano
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
14 years 3 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu
ECIR
2007
Springer
13 years 10 months ago
Searching Documents Based on Relevance and Type
This paper extends previous work on document retrieval and document type classification, addressing the problem of ‘typed search’. Specifically, given a query and a designated ...
Jun Xu, Yunbo Cao, Hang Li, Nick Craswell, Yalou H...
JLP
2008
134views more  JLP 2008»
13 years 9 months ago
Backwards type analysis of asynchronous method calls
Asynchronous method calls have been proposed to better integrate object orientation with distribution. In the Creol language, asynchronous method calls are combined with so-called...
Einar Broch Johnsen, Ingrid Chieh Yu