Sciweavers

1816 search results - page 292 / 364
» Trace oblivious computation
Sort
View
PLDI
2010
ACM
14 years 1 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
SACMAT
2010
ACM
14 years 1 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
EUROPAR
2001
Springer
14 years 1 months ago
Self-Organizing Hierarchical Cluster Timestamps
Distributed-system observation tools require an efficient data structure to store and query the partial-order of execution. Such data structures typically use vector timestamps to...
Paul A. S. Ward, David J. Taylor
ICPR
2000
IEEE
14 years 1 months ago
Automatic Left Ventricular Endocardium Detection in Echocardiograms Based on Ternary Thresholding Method
Methods for automatic detection of left ventricular endocardium in echocardiograms are required to quantitatively evaluate the functional performance of the left ventricle. This s...
Wataru Ohyama, Tetsushi Wakabayashi, Fumitaka Kimu...
SIGSOFT
1998
ACM
14 years 29 days ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin