Sciweavers

5838 search results - page 982 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
IFIP
2009
Springer
15 years 10 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...
146
Voted
LICS
2008
IEEE
15 years 10 months ago
Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule
Separation logic involves two dual forms of modularity: local reasoning makes part of the store invisible within a static scope, whereas hiding local state makes part of the store...
François Pottier
127
Voted
ASAP
2007
IEEE
144views Hardware» more  ASAP 2007»
15 years 10 months ago
A High-Throughput Programmable Decoder for LDPC Convolutional Codes
In this paper, we present and analyze a novel decoder architecture for LDPC convolutional codes (LDPCCCs). The proposed architecture enables high throughput and can be programmed ...
Marcel Bimberg, Marcos B. S. Tavares, Emil Mat&uac...
123
Voted
CC
2007
Springer
139views System Software» more  CC 2007»
15 years 10 months ago
Using Prefetching to Improve Reference-Counting Garbage Collectors
Reference counting is a classical garbage collection method. Recently, a series of papers have extended the basic method to drastically reduce its notorious overhead and extend the...
Harel Paz, Erez Petrank
CCS
2007
ACM
15 years 10 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...