135
click to vote
CASSIS
15 years 2 months ago
2005 Springer
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
CASSIS
15 years 2 months ago
2005 Springer
Memory is one of the scarcest resource of embedded and constrained devices. This paper studies the memory footprint benefit of pre-deploying embedded Java systems up to their acti...
CASSIS
15 years 2 months ago
2005 Springer
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
CASSIS
15 years 2 months ago
2005 Springer
System software for deeply embedded devices has to cope with a broad variety of requirements and platforms, but especially with strict resource constraints. To compete against prop...
CASSIS
15 years 2 months ago
2005 Springer
Abstract. Abstract interpretation is a particularly well-suited methodology to build modular correctness proof of static analysers. Proof modularity becomes essential when correctn...
|