Sciweavers

4386 search results - page 402 / 878
» A Tamper-Resistant Programming Language System
Sort
View
SP
2000
IEEE
15 years 7 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
OOGRAPHICS
1995
15 years 7 months ago
Object-Oriented Design for Image Synthesis
The structure of the image synthesis process naturally leads to the use of object-oriented software design and many existing rendering systems are based on some kind of object-orie...
Philipp Slusallek, Hans-Peter Seidel
127
Voted
PLDI
2010
ACM
15 years 7 months ago
Parameterized Verification of Transactional Memories
We describe an automatic verification method to check whether transactional memories ensure strict serializability--a key property assumed of the transactional interface. Our main...
Michael Emmi, Rupak Majumdar, Roman Manevich
CD
2005
Springer
15 years 9 months ago
A Methodology for Developing and Deploying Distributed Applications
Abstract. We describe a methodology for developing and deploying distributed Java applications using a reflective middleware system called RAFDA. We illustrate the methodology by d...
Graham N. C. Kirby, Scott M. Walker, Stuart J. Nor...
146
Voted
CD
2004
Springer
15 years 9 months ago
Towards a Dynamic Resource Contractualisation for Software Components
Abstract In this paper we present a framework defining the architecture of systems providing software components with means to contractualise their resource access conditions with...
Nicolas Le Sommer