Sciweavers

325 search results - page 56 / 65
» Secure safe ambients
Sort
View
ICSEA
2006
IEEE
14 years 1 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz
CASSIS
2005
Springer
14 years 1 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
OOPSLA
2005
Springer
14 years 29 days ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig
PERVASIVE
2005
Springer
14 years 29 days ago
Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors
Abstract. In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the info...
D. H. Wilson, Christopher G. Atkeson
RTA
2005
Springer
14 years 29 days ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty