Sciweavers

551 search results - page 91 / 111
» Software Implemented Fault Tolerance Technologies and Experi...
Sort
View
WWW
2008
ACM
14 years 8 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
ASSETS
2009
ACM
13 years 5 months ago
3DScan: an environment control system supporting persons with severe motor impairments
This proposal is about a poster dealing with a scanningbased software system, which aims at giving persons with severe motor impairments a means to interact with their immediate e...
Torsten Felzer, Stephan Rinderknecht
ADAEUROPE
2000
Springer
13 years 12 months ago
(True) Polymorphism in SPARK2000
of the Reliant Telco Platform, K. Wiesneth Safety-oriented INTERBUS INTERBUS Safety-, K. Meyer-Graefe Developing a Binding Process for Automated Program Recognition and Fault Local...
Tse-Min Lin, John A. McDermid
OSDI
1996
ACM
13 years 8 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
ICST
2011
IEEE
12 years 11 months ago
Constraint-Based Program Debugging Using Data Structure Repair
—Developers have used data structure repair over the last few decades as an effective means to recover on-the-fly from errors in program state. Traditional repair techniques wer...
Muhammad Zubair Malik, Junaid Haroon Siddiqui, Sar...