Sciweavers

6149 search results - page 43 / 1230
» Revealing the programming process
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 4 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
GECCO
2004
Springer
14 years 4 months ago
Program Evolution by Integrating EDP and GP
This paper discusses the performance of a hybrid system which consists of EDP and GP. EDP, Estimation of Distribution Programming, is the program evolution method based on the prob...
Kohsuke Yanai, Hitoshi Iba
VL
2003
IEEE
128views Visual Languages» more  VL 2003»
14 years 4 months ago
Development and evaluation of a model of programming errors
Models of programming and debugging suggest many causes of errors, and many classifications of error types exist. Yet, there has been no attempt to link causes of errors to these ...
Andrew Jensen Ko, Brad A. Myers
ACSAC
2003
IEEE
14 years 4 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
SIGCSE
2002
ACM
207views Education» more  SIGCSE 2002»
13 years 10 months ago
Exploration of process interaction in operating systems: a pipe-fork simulator
Abstract This paper examines the use of a simulator to explore process interaction in Unix. The simulator allows instructors to trace through a variety of programs and to show how ...
Steven Robbins