Sciweavers

890 search results - page 125 / 178
» Programming language methods in computer security
Sort
View
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 3 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
SAS
2010
Springer
134views Formal Methods» more  SAS 2010»
13 years 8 months ago
Strictness Meets Data Flow
Abstract. Properties of programs can be formulated using various techdataflow analysis, abstract interpretation and type-like inference systems. This paper reconstructs strictness...
Tom Schrijvers, Alan Mycroft
ICALP
2003
Springer
14 years 3 months ago
Real-Time Scheduling with a Budget
We are given a set of jobs each has a processing time, a non-negative weight, a set of possible time intervals in which it can be processed and a cost. The goal is to schedule a f...
Joseph Naor, Hadas Shachnai, Tami Tamir
CADE
1998
Springer
14 years 2 months ago
System Description: card TAP: The First Theorem Prover on a Smart Card
Abstract. We present the first implementation of a theorem prover running on a smart card. The prover is written in Java and implements a dual tableau calculus. Due to the limited ...
Rajeev Goré, Joachim Posegga, Andrew Slater...
HCW
1998
IEEE
14 years 2 months ago
On the Interaction between Mobile Processes and Objects
Java's remote method invocation mechanism provides a number of features that extend the functionality of traditional client server-based distributed systems. However, there a...
Suresh Jagannathan, Richard Kelsey