Sciweavers

2841 search results - page 82 / 569
» A Call to Order
Sort
View
ICSE
2007
IEEE-ACM
15 years 10 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
VLDB
1997
ACM
84views Database» more  VLDB 1997»
15 years 2 months ago
Using Versions in Update Transactions: Application to Integrity Checking
This paper proposes an extension of the multiversion two phase locking protocol, called EMVZPL, which enables update transactions to use versions while guaranteeing the serializab...
François Llirbat, Eric Simon, Dimitri Tombr...
IWFM
2003
14 years 11 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
CN
2006
117views more  CN 2006»
14 years 10 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
ER
2004
Springer
93views Database» more  ER 2004»
15 years 3 months ago
Metaprogramming for Relational Databases
Abstract. For systems that share enough structural and functional commonalities, reuse in schema development and data manipulation can be achieved by defining problem-oriented lang...
Jernej Kovse, Christian Weber 0002, Theo Härd...