Sciweavers

8 search results - page 1 / 2
» Partial Bindings of Components - Any Harm
Sort
View
ACSAC
2000
IEEE
13 years 9 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
PEPM
1993
ACM
13 years 8 months ago
Polyvariant Binding-Time Analysis For Applicative Languages
Binding-time analysis is a crucial component of an ofine partial evaluator. The accuracy of the binding-time information that it produces determines the degree of specialization o...
Charles Consel
AAAI
1994
13 years 6 months ago
The Capacity of Convergence-Zone Episodic Memory
Abstract- Human episodic memory provides a seemingly unlimited storage for everyday experiences, and a retrieval system that allows us to access the experiences with partial activa...
Mark Moll, Risto Miikkulainen, Jonathan Abbey
ACSAC
2004
IEEE
13 years 8 months ago
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain fun...
Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuj...
CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 4 months ago
Support for Evolving Software Architectures in the ArchWare ADL
Software that cannot evolve is condemned to atrophy: it cannot accommodate the constant revision and renegotiation of its business goals nor intercept the potential of new technol...
Ronald Morrison, Graham N. C. Kirby, Dharini Balas...