Sciweavers

107 search results - page 22 / 22
» A Reputation-Based Approach for Securing Vivaldi Embedding S...
Sort
View
TOPLAS
2008
138views more  TOPLAS 2008»
14 years 11 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
COMCOM
2006
121views more  COMCOM 2006»
14 years 11 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal