Sciweavers

890 search results - page 89 / 178
» Programming language methods in computer security
Sort
View
VL
2010
IEEE
216views Visual Languages» more  VL 2010»
13 years 8 months ago
Explanatory Debugging: Supporting End-User Debugging of Machine-Learned Programs
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a “prog...
Todd Kulesza, Simone Stumpf, Margaret M. Burnett, ...
ICDCS
2003
IEEE
14 years 3 months ago
Monotonicity and Partial Results Protection for Mobile Agents
Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
Bennet S. Yee
CGO
2011
IEEE
13 years 1 months ago
Language and compiler support for auto-tuning variable-accuracy algorithms
—Approximating ideal program outputs is a common technique for solving computationally difficult problems, for adhering to processing or timing constraints, and for performance ...
Jason Ansel, Yee Lok Wong, Cy P. Chan, Marek Olsze...
PLDI
2003
ACM
14 years 3 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
LOGCOM
2010
120views more  LOGCOM 2010»
13 years 4 months ago
Paraconsistent Machines and their Relation to Quantum Computing
We describe a method to axiomatize computations in deterministic Turing machines (TMs). When applied to computations in non-deterministic TMs, this method may produce contradictor...
Juan C. Agudelo, Walter Alexandre Carnielli