Sciweavers

4731 search results - page 117 / 947
» Securing Interactive Programs
Sort
View
ENTCS
2000
60views more  ENTCS 2000»
13 years 8 months ago
Writing Constructive Proofs Yielding Efficient Extracted Programs
The NuPRL system [3] was designed for interactive writing of machine
Aleksey Nogin
SIGADA
2004
Springer
14 years 2 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
DAC
2003
ACM
14 years 10 months ago
Accurate timing analysis by modeling caches, speculation and their interaction
Schedulability analysis of real-time embedded systems requires worst case timing guarantees of embedded software performance. This involves not only language level program analysi...
Xianfeng Li, Tulika Mitra, Abhik Roychoudhury
CCS
2007
ACM
14 years 3 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
APCHI
1998
IEEE
14 years 1 months ago
Cleogo: Collaborative and Multi-Metaphor Programming for Kids
Cleogo is a novel groupware environment that allows several users to simultaneously develop programs through any mixture of three alternative programming metaphors: a direct manip...
Andy Cockburn, Andrew Bryant