Sciweavers

8623 search results - page 1549 / 1725
» Software engineering for secure systems
Sort
View
POPL
2008
ACM
14 years 10 months ago
Enhancing modular OO verification with separation logic
Conventional specifications for object-oriented (OO) programs must adhere to behavioral subtyping in support of class inheritance and method overriding. However, this requirement ...
Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, She...
EUROSYS
2010
ACM
14 years 6 months ago
Differential RAID: Rethinking RAID for SSD Reliability
Deployment of SSDs in enterprise settings is limited by the low erase cycles available on commodity devices. Redundancy solutions such as RAID can potentially be used to protect a...
Mahesh Balakrishnan, Asim Kadav, Vijayan Prabhakar...
SIGCSE
2010
ACM
169views Education» more  SIGCSE 2010»
14 years 4 months ago
Interfaces first (and foremost) with Java
ion is a critical concept that underlies many topics in computing science. For example, in software engineering, the distinction between a component’s behavior and its implement...
Paolo A. G. Sivilotti, Matthew Lang
PLDI
2009
ACM
14 years 4 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer
SAC
2009
ACM
14 years 4 months ago
A personalized framework for trust assessment
The number of computational trust models has been increasing rapidly in recent years, yet their applications for automating trust evaluation are still limited. The main obstacle i...
Trung Dong Huynh
« Prev « First page 1549 / 1725 Last » Next »