Sciweavers

1440 search results - page 251 / 288
» Third-Party Flow Control
Sort
View
ESORICS
2000
Springer
14 years 2 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ECOWS
2009
Springer
14 years 2 months ago
Run-time Verification of Behavioural Conformance for Conversational Web Services
— Web services exposing run-time behaviour that deviates from their behavioural specifications represent a major threat to the sustainability of a service-oriented ecosystem. It ...
Dimitris Dranidis, Ervin Ramollari, Dimitrios Kour...
AAAI
2008
14 years 1 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
WSC
2008
14 years 1 months ago
Simulations-based and solver-based optimization approaches for batch processes in semiconductor manufacturing
Scheduling is one of the key factors for semiconductor fabrication productivity. Objectives like lot cycle time and throughput must be optimized to push the technological developm...
Andreas Klemmt, Sven Horn, Gerald Weigert, Thomas ...
ASPLOS
2008
ACM
14 years 1 months ago
Accurate branch prediction for short threads
Multi-core processors, with low communication costs and high availability of execution cores, will increase the use of execution and compilation models that use short threads to e...
Bumyong Choi, Leo Porter, Dean M. Tullsen