Sciweavers

426 search results - page 48 / 86
» Specification, Abduction, and Proof
Sort
View
TPDS
1998
124views more  TPDS 1998»
13 years 9 months ago
Using Recorded Values for Bounding the Minimum Completion Time in Multiprocessors
—The way the processes in a parallel program are scheduled on the processors of a multiprocessor system affects the performance significantly. Finding a schedule of processes to ...
Lars Lundberg, Håkan Lennerstad
POPL
2005
ACM
14 years 10 months ago
Environmental acquisition revisited
In 1996, Gil and Lorenz proposed programming language constructs for specifying environmental acquisition in addition to inheritance acquisition for objects. They noticed that in ...
Richard Cobbe, Matthias Felleisen
ESORICS
2002
Springer
14 years 9 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
FOCS
1994
IEEE
14 years 2 months ago
A Spectral Approach to Lower Bounds
We establish a nonlinear lower bound for halfplane range searching over a group. Specifically, we show that summing up the weights of n (weighted) points within n halfplanes requir...
Bernard Chazelle