Sciweavers

1342 search results - page 134 / 269
» Ordered Programs as Abductive Systems
Sort
View
MOZ
2004
Springer
14 years 2 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
BIRTHDAY
2003
Springer
14 years 2 months ago
Extreme Model Checking
One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checkin...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...
ARCS
2009
Springer
14 years 3 months ago
Evaluating Sampling Based Hotspot Detection
In sampling based hotspot detection, performance engineers sample the running program periodically and record the Instruction Pointer (IP) addresses at the sampling. Empirically, f...
Qiang Wu, Oskar Mencer
ICALP
1990
Springer
14 years 1 months ago
Static Correctness of Hierarchical Procedures
A system of hierarchical, fully recursive types in a truly imperative language allows program fragments written for small types to be reused for all larger types. To exploit this ...
Michael I. Schwartzbach
PLDI
2009
ACM
14 years 3 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni