Sciweavers

1777 search results - page 220 / 356
» Programming Cryptographic Protocols
Sort
View
TGC
2005
Springer
14 years 2 months ago
A Distributed Object-Oriented Language with Session Types
Abstract. In the age of the world-wide web and mobile computing, programming communication-centric software is essential. Thus, programmers and program designers are exposed to new...
Mariangiola Dezani-Ciancaglini, Nobuko Yoshida, Al...
ISCA
2000
IEEE
78views Hardware» more  ISCA 2000»
14 years 1 months ago
On the value locality of store instructions
Value locality, a recently discovered program attribute that describes the likelihood of the recurrence of previously-seen program values, has been studied enthusiastically in the...
Kevin M. Lepak, Mikko H. Lipasti
AOSD
2010
ACM
13 years 9 months ago
An architecture for composing embedded domain-specific languages
Embedded domain-specific languages (EDSLs) are said to be easier to compose than DSLs that are implemented by preprocessors. However, existing approaches focus on composition scen...
Tom Dinkelaker, Michael Eichberg, Mira Mezini
ASPLOS
2009
ACM
14 years 9 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 5 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...