Sciweavers

88 search results - page 11 / 18
» Typing noninterference for reactive programs
Sort
View
POPL
2000
ACM
14 years 3 days ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
TLDI
2003
ACM
121views Formal Methods» more  TLDI 2003»
14 years 1 months ago
Types for atomicity
Ensuring the correctness of multithreaded programs is difficult, due to the potential for unexpected and nondeterministic interactions between threads. Previous work has addresse...
Cormac Flanagan, Shaz Qadeer
ICRA
2002
IEEE
113views Robotics» more  ICRA 2002»
14 years 1 months ago
Specifying Behavior in C++
Most robot programming takes place in the “time domain.” That is, the goal is to specify the behavior of a system that is acquiring a continual temporal stream of inputs, and ...
Xiangtian Dai, Gregory D. Hager, John Peterson
EPIA
2003
Springer
14 years 1 months ago
jcc: Integrating Timed Default Concurrent Constraint Programming into Java
Abstract. This paper describes jcc, an integration of the timed default concurrent constraint programming framework [16] (Timed Default cc) into JAVA [7]. jcc is intended for use i...
Vijay A. Saraswat, Radha Jagadeesan, Vineet Gupta
VLDB
1994
ACM
162views Database» more  VLDB 1994»
14 years 19 days ago
NAOS - Efficient and Modular Reactive Capabilities in an Object-Oriented Database System
This paper describes the design and implementation of NAOS, an active rule component in the object-oriented database system 02. The contribution of this work is related to two mai...
Christine Collet, Thierry Coupaye, T. Svensen