Sciweavers

257 search results - page 12 / 52
» Programming with narrowing: A tutorial
Sort
View
RTA
2005
Springer
14 years 1 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
FUIN
2007
99views more  FUIN 2007»
13 years 7 months ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
TGC
2007
Springer
14 years 1 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith

Book
340views
15 years 3 months ago
Essentials of the Java Programming Language, Part 1
"If you are new to programming in the Java language, have some experience with other languages, and are familiar with things like displaying text or graphics or performing sim...
By Monica Pawlan
COMSUR
2011
201views Hardware» more  COMSUR 2011»
12 years 7 months ago
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
— Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency and infotainment. In this survey and tutorial p...
Georgios Karagiannis, Onur Altintas, Eylem Ekici, ...