Sciweavers

4386 search results - page 268 / 878
» A Tamper-Resistant Programming Language System
Sort
View
ICCL
1998
IEEE
15 years 7 months ago
A Lightweight Object Migration Protocol
This paper presents a lightweight object migration protocol that preserves centralized object semantics yet allows for precise prediction of network behavior. The protocol is impl...
Peter Van Roy, Per Brand, Seif Haridi, Raphaë...
93
Voted
IFIP
1998
Springer
15 years 7 months ago
BUILD-IT: A Brick-based integral Solution Supporting Multidisciplinary Design Tasks
BUILD-IT is an up-and-running system putting at work highly intuitive, videobased interaction technology to support complex planning and configuration tasks. It makes state-of-the...
Morten Fjeld, Kristina Lauche, S. Dierssen, Martin...
ASPLOS
1994
ACM
15 years 7 months ago
Software Overhead in Messaging Layers: Where Does the Time Go?
Despite improvements in network interfaces and software messaging layers, software communication overhead still dominates the hardware routing cost in most systems. In this study,...
Vijay Karamcheti, Andrew A. Chien
IFIP
1992
Springer
15 years 7 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
AMAST
2004
Springer
15 years 7 months ago
A Formally Verified Calculus for Full Java Card
We present a calculus for the verification of sequential Java programs. It supports all Java language constructs and has additional support for Java Card. The calculus is formally ...
Kurt Stenzel