Sciweavers

564 search results - page 92 / 113
» Runtime Verification of C Programs
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
The SDVM - An Approach for Future Adaptive Computer Clusters
The Self Distributing Virtual Machine (SDVM) is a parallel computing machine which consists of a cluster of customary computers. The participating machines may have different comp...
Jan Haase, Frank Eschmann, Klaus Waldschmidt
WCRE
2005
IEEE
14 years 2 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 2 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
ASPLOS
2008
ACM
13 years 10 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
WICSA
2008
13 years 10 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...