Sciweavers

1770 search results - page 66 / 354
» Writing requirements in computer security
Sort
View
IJISEC
2007
149views more  IJISEC 2007»
13 years 9 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
OOPSLA
2001
Springer
14 years 1 months ago
Jiazzi: New-Age Components for Old-Fashioned Java
We present Jiazzi, a system that enables the construction of largescale binary components in Java. Jiazzi components can be thought of as generalizations of Java packages with add...
Sean McDirmid, Matthew Flatt, Wilson C. Hsieh
OOPSLA
2010
Springer
13 years 7 months ago
Teaching and training developer-testing techniques and tool support
Developer testing is a type of testing where developers test their code as they write it, as opposed to testing done by a separate quality assurance organization. Developer testin...
Tao Xie, Jonathan de Halleux, Nikolai Tillmann, Wo...
HPCA
2011
IEEE
13 years 21 days ago
Essential roles of exploiting internal parallelism of flash memory based solid state drives in high-speed data processing
Flash memory based solid state drives (SSDs) have shown a great potential to change storage infrastructure fundamentally through their high performance and low power. Most recent ...
Feng Chen, Rubao Lee, Xiaodong Zhang
IJCNLP
2004
Springer
14 years 2 months ago
Spoken Versus Written Queries for Mobile Information Access: An Experiment on Mandarin Chinese
As Chinese is not alphabetic and the input of Chinese characters into computer is still a difficult and unsolved problem, voice retrieval of information becomes apparently an imp...
Heather Du, Fabio Crestani