Sciweavers

303 search results - page 43 / 61
» Typing Safe Deallocation
Sort
View
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ESOP
2006
Springer
14 years 1 months ago
Linear Regions Are All You Need
Abstract. The type-and-effects system of the Tofte-Talpin region calculus makes it possible to safely reclaim objects without a garbage collector. However, it requires that regions...
Matthew Fluet, Greg Morrisett, Amal J. Ahmed
C++
1992
83views more  C++ 1992»
13 years 11 months ago
Adding Concurrency to a Programming Language
A programming language that lacks facilities for concurrent programming can gain those facilities in two ways: the language can be extended with additional constructs, which will ...
Peter A. Buhr, G. Ditchfeld
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 10 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
ETS
2000
IEEE
85views Hardware» more  ETS 2000»
13 years 9 months ago
A Framework for Enabling an Internet Learning Community
We view the Internet as a "virtual laboratory" and have developed a framework to support experiments in web-based community learning. Our system is called the Community ...
Elizabeth Sklar, Jordan B. Pollack