Sciweavers

2257 search results - page 366 / 452
» Secure program partitioning
Sort
View
COMGEO
1999
ACM
13 years 8 months ago
Visualizing geometric algorithms over the Web
The visual nature of geometry applications makes them a natural area where visualization can be an effective tool for demonstrating algorithms. In this paper we propose a new mode...
James E. Baker, Isabel F. Cruz, Giuseppe Liotta, R...
ICSE
2009
IEEE-ACM
14 years 9 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
SIGSOFT
2002
ACM
14 years 9 months ago
Using redundancies to find errors
This paper explores the idea that redundant operations, like type errors, commonly flag correctness errors. We experimentally test this idea by writing and applying four redundanc...
Yichen Xie, Dawson R. Engler
SEFM
2009
IEEE
14 years 3 months ago
Implementation Correctness of a Real-Time Operating System
—In the modern car, electronic devices are even employed for safety-critical missions like brake control, where failures might cost human lives. Among various approaches to incre...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
IFIP
2009
Springer
14 years 3 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...