Sciweavers

2512 search results - page 330 / 503
» Software Transactional Memory
Sort
View
103
Voted
AMAST
2004
Springer
15 years 8 months ago
Separate Compositional Analysis of Class-Based Object-Oriented Languages
Abstract. We present a separate compositional analysis for objectoriented languages. We show how a generic static analysis of a context that uses an object can be split into two se...
Francesco Logozzo
112
Voted
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
15 years 8 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
155
Voted
SEM
2004
Springer
15 years 8 months ago
Towards the Development of Ubiquitous Middleware Product Lines
Abstract. Ubiquitous computing is a challenge for the design of middleware. The reasons are resource constraints, mobility, heterogeneity, etc., just to name a few. We argue that s...
Sven Apel, Klemens Böhm
ISORC
2003
IEEE
15 years 8 months ago
Design of SMIL Browser Functionality in Mobile Terminals
SMIL is a markup language which enables us to describe multimedia contents. This paper proposes a design model of SMIL browser functionality for mobile terminals whose resources a...
Satoshi Hieda, Yoshinori Saida, Hiroshi Chishima, ...
96
Voted
ESSOS
2010
Springer
15 years 7 months ago
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks
Web browsers that support a safe language such as Javascript are becoming a platform of great interest for security attacks. One such attack is a heap-spraying attack: a new kind o...
Francesco Gadaleta, Yves Younan, Wouter Joosen