Sciweavers

1821 search results - page 154 / 365
» Security-Aware Program Transformations
Sort
View
TCS
2010
13 years 7 months ago
A trajectory-based strict semantics for program slicing
We define a program semantics that is preserved by dependence-based slicing algorithms. It is a natural extension, to non-terminating programs, of the semantics introduced by Wei...
Richard W. Barraclough, David Binkley, Sebastian D...
ICDCS
2007
IEEE
14 years 3 months ago
Exploiting Symbolic Techniques in Automated Synthesis of Distributed Programs with Large State Space
Automated formal analysis methods such as program verification and synthesis algorithms often suffer from time complexity of their decision procedures and also high space complex...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
DRM
2007
Springer
14 years 3 months ago
Data structures for limited oblivious execution of programs while preserving locality of reference
We introduce a data structure for program execution under a limited oblivious execution model. For fully oblivious execution along the lines of Goldreich and Ostrovsky [2], one tr...
Avinash V. Varadarajan, Ramarathnam Venkatesan, C....
GPCE
2005
Springer
14 years 2 months ago
A Generative Programming Approach to Interactive Information Retrieval: Insights and Experiences
We describe the application of generative programming to a problem in interactive information retrieval. The particular interactive information retrieval problem we study is the su...
Saverio Perugini, Naren Ramakrishnan
ESORICS
2004
Springer
14 years 2 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...