Sciweavers

1448 search results - page 86 / 290
» Restricted Stack Implementations
Sort
View
ITP
2010
172views Mathematics» more  ITP 2010»
13 years 6 months ago
Automated Machine-Checked Hybrid System Safety Proofs
mentation of the Abstraction Method In Coq Eelis van der Weegen Institute for Computing and Information Sciences Raboud University Nijmegen This technical report documents our deve...
Herman Geuvers, Adam Koprowski, Dan Synek, Eelis v...
VTC
2010
IEEE
171views Communications» more  VTC 2010»
13 years 6 months ago
Optimum Physical-Layer Frame Size for Maximising the Application-Layer Rateless Code's Effective Throughput
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Tim Stevens, Robert G. Maunder, Lajos Hanzo
BICA
2010
13 years 2 months ago
Explanatory Aspirations and the Scandal of Cognitive Neuroscience
In this position paper we argue that BICA must simultaneously be compatible with the explanation of human cognition and support the human design of artificial cognitive systems. Mo...
Ross Gayler, Simon D. Levy, Rens Bod
ICFP
2003
ACM
14 years 7 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
ACSAC
2006
IEEE
14 years 1 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr