Sciweavers

27 search results - page 3 / 6
» Checking ownership and confinement
Sort
View
ICDAR
2003
IEEE
13 years 11 months ago
Document Identity, Authentication and Ownership: The Future of Biometric Verification
Document security is an increasingly important element in the multi-faceted discipline of document processing, and authentication of individual identity will play an increasingly ...
Michael C. Fairhurst
SCP
2008
144views more  SCP 2008»
13 years 6 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...
ECOOP
2007
Springer
14 years 6 days ago
MAO: Ownership and Effects for More Effective Reasoning About Aspects
Abstract. Aspect-oriented advice increases the number of places one must consider during reasoning, since advice may affect all method calls and field accesses. MAO, a new variant...
Curtis Clifton, Gary T. Leavens, James Noble
PLDI
2003
ACM
13 years 11 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
AMC
2006
75views more  AMC 2006»
13 years 6 months ago
Common stabilizers for linear control systems in the presence of actuators outage
This paper presents common stabilizers for linear control systems when actuators happen to fail. The possible outage of actuators examined in this study are not confined to a pre-s...
Yew-Wen Liang, Der-Cherng Liaw