Sciweavers

124 search results - page 14 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
POPL
1998
ACM
15 years 1 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
KBSE
1998
IEEE
15 years 1 months ago
Explaining Synthesized Software
Motivated by NASA's need for high-assurance software, NASA Ames' Amphion project has developed a generic program generation system based on deductive synthesis. Amphion ...
Jeffrey Van Baalen, Peter Robinson, Michael R. Low...
IJES
2006
110views more  IJES 2006»
14 years 9 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar
FGR
2004
IEEE
167views Biometrics» more  FGR 2004»
15 years 1 months ago
A New Instrumented Approach For Translating American Sign Language Into Sound And Text
This paper discusses a novel approach for capturing and translating isolated gestures of American Sign Language into spoken and written words. The instrumented part of the system ...
Jose L. Hernandez-Rebollar, Nicholas Kyriakopoulos...
ISSRE
2005
IEEE
15 years 3 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier