Sciweavers

173 search results - page 10 / 35
» Programming with Crosscutting Effective Views
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
VL
2003
IEEE
136views Visual Languages» more  VL 2003»
14 years 29 days ago
The effects of graphical and textual visualisations in multi-representational debugging environments
The effects of graphical and textual visualisations in a multi-representational debugging environment were investigated in computing students who used a software debugging environ...
Pablo Romero, Benedict du Boulay, Rudi Lutz, Richa...
CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 7 months ago
Macro and micro view on steady states in state space
This paper describes visualization of chaotic attractor and elements of the singularities in 3D space. 3D view of these effects enables to create a demonstrative projection about r...
Branislav Sobota, Milan Guzan
SIGSOFT
2008
ACM
14 years 8 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ASP
2003
Springer
14 years 28 days ago
Mappings Between Domain Models in Answer Set Programming
Integration of data is required when accessing multiple databases within an organization or on the WWW. Schema integration is required for database interoperability, but it is curr...
Stefania Costantini, Andrea Formisano, Eugenio G. ...