Sciweavers

1280 search results - page 227 / 256
» Soft Typing with Conditional Types
Sort
View
EUROSYS
2009
ACM
14 years 6 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
ALT
2005
Springer
14 years 6 months ago
Learning Multiple Languages in Groups
We consider a variant of Gold’s learning paradigm where a learner receives as input n different languages (in form of one text where all input languages are interleaved). Our g...
Sanjay Jain, Efim B. Kinber
WWW
2010
ACM
14 years 4 months ago
Expressive auctions for externalities in online advertising
When online ads are shown together, they compete for user attention and conversions, imposing negative externalities on each other. While the competition for user attention in spo...
Arpita Ghosh, Amin Sayedi
ESOP
2009
Springer
14 years 3 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
CLUSTER
2009
IEEE
14 years 3 months ago
MDCSim: A multi-tier data center simulation, platform
Abstract—Performance and power issues are becoming increasingly important in the design of large cluster based multitier data centers for supporting a multitude of services. Desi...
Seung-Hwan Lim, Bikash Sharma, Gunwoo Nam, Eun-Kyo...