Sciweavers

581 search results - page 94 / 117
» On the Verifiability of Programs Written in the Feature Lang...
Sort
View
CSFW
2011
IEEE
12 years 7 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
ESAW
2009
Springer
14 years 2 months ago
Incorporating BDI Agents into Human-Agent Decision Making Research
Artificial agents, people, institutes and societies all have the ability to make decisions. Decision making as a research area therefore involves a broad spectrum of sciences, ran...
Bart Kamphorst, Arlette van Wissen, Virginia Dignu...
SE
2010
13 years 9 months ago
Automated Benchmarking of Java APIs
: Performance is an extra-functional property of software systems which is often critical for achieving sufficient scalability or efficient resource utilisation. As many applicatio...
Michael Kuperberg, Fouad Omri, Ralf Reussner
LISA
2004
13 years 9 months ago
Auto-configuration by File Construction: Configuration Management with newfig
A tool is described that provides for the automatic configuration of systems from a single description. The tool, newfig, uses two simple concepts to provide its functionality: bo...
William LeFebvre, David Snyder
PLDI
2011
ACM
12 years 10 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...