Sciweavers

309 search results - page 37 / 62
» Termination proofs for systems code
Sort
View
FIDJI
2003
Springer
14 years 28 days ago
Model Generation for Distributed Java Programs
— We present techniques for analyzing the source code of distributed Java applications, and building finite models of their behaviour. The models are labelled transition systems...
Rabéa Boulifa, Eric Madelaine
CORR
2007
Springer
116views Education» more  CORR 2007»
13 years 7 months ago
Rate Bounds for MIMO Relay Channels Using Message Splitting
This paper considers the multi-input multi-output (MIMO) relay channel where multiple antennas are employed by each terminal. Compared to single-input singleoutput (SISO) relay ch...
Caleb K. Lo, Sriram Vishwanath, Robert W. Heath Jr...
APLAS
2007
ACM
13 years 11 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
JALC
2006
125views more  JALC 2006»
13 years 7 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
CORR
2008
Springer
87views Education» more  CORR 2008»
13 years 7 months ago
The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel
For general memoryless systems, the typical information theoretic solution - when exists - has a "single-letter" form. This reflects the fact that optimum performance ca...
Tal Philosof, Ram Zamir