Sciweavers

2625 search results - page 500 / 525
» The development of the Emerald programming language
Sort
View
ESORICS
2009
Springer
13 years 11 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
13 years 11 months ago
Autonomous evolutionary music composer
A second-generation autonomous music composition tool is developed using Genetic Algorithms. The composition is conducted in two Stages. The first Stage generates and identifies m...
Yaser M. A. Khalifa, Mohamed Basel Al-Mourad
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
CAV
1997
Springer
102views Hardware» more  CAV 1997»
13 years 11 months ago
Efficient Model Checking Using Tabled Resolution
We demonstrate the feasibility of using the XSB tabled logic programming system as a programmable fixed-point engine for implementing efficient local model checkers. In particular,...
Y. S. Ramakrishna, C. R. Ramakrishnan, I. V. Ramak...
ICSE
1995
IEEE-ACM
13 years 11 months ago
Architectural Mismatch or Why It's Hard to Build Systems Out Of Existing Parts
Many would argue that future breakthroughs in software productivity will dependon our ability to combine existing pieces of software to produce new applications. An important step...
David Garlan, Robert Allen, John Ockerbloom