Sciweavers

303 search results - page 23 / 61
» Typing Safe Deallocation
Sort
View
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 1 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
CCR
2004
147views more  CCR 2004»
13 years 9 months ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
DASFAA
2009
IEEE
203views Database» more  DASFAA 2009»
14 years 4 months ago
Adaptive Safe Regions for Continuous Spatial Queries over Moving Objects
Abstract. Continuous spatial queries retrieve a set of time-varying objects continuously during a given period of time. However, monitoring moving objects to maintain the correctne...
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku
GPCE
2007
Springer
14 years 4 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
PADL
2012
Springer
12 years 5 months ago
Virtualizing Real-World Objects in FRP
We begin with a functional reactive programming (FRP) model in which every program is viewed as a signal function that converts a stream of input values into a stream of output va...
Daniel Winograd-Cort, Hai Liu, Paul Hudak