Sciweavers

1894 search results - page 300 / 379
» A TLA Proof System
Sort
View
APSEC
2008
IEEE
15 years 10 months ago
A Heap Model for Java Bytecode to Support Separation Logic
Memory usage analysis is an important problem for resource-constrained mobile devices, especially under mission- or safety-critical circumstances. Program codes running on or bein...
Chenguang Luo, Guanhua He, Shengchao Qin
CDC
2008
IEEE
114views Control Systems» more  CDC 2008»
15 years 10 months ago
Stability of node-based multipath routing and dual congestion control
— This paper considers a network flow control problem where routing and input rates are controlled in a decentralized way across a network, to optimize a global welfare objectiv...
Enrique Mallada, Fernando Paganini
ISORC
2008
IEEE
15 years 10 months ago
Hardware Objects for Java
Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled ...
Martin Schoeberl, Christian Thalinger, Stephan Kor...
LICS
2008
IEEE
15 years 10 months ago
Nonlocal Flow of Control and Kleene Algebra with Tests
Kleene algebra with tests (KAT) is an equational system for program verification that combines Kleene algebra (KA), or the algebra of regular expressions, with Boolean algebra. I...
Dexter Kozen
INFOCOM
2007
IEEE
15 years 10 months ago
Limiting Sybil Attacks in Structured P2P Networks
— One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks: malicious parties can compromise the network by generat...
Hosam Rowaihy, William Enck, Patrick McDaniel, Tom...