Sciweavers

4386 search results - page 413 / 878
» A Tamper-Resistant Programming Language System
Sort
View
157
Voted
FUIN
2010
156views more  FUIN 2010»
15 years 2 months ago
A Tutorial Implementation of a Dependently Typed Lambda Calculus
Abstract. We present the type rules for a dependently typed core calculus together with a straightforward implementation in Haskell. We explicitly highlight the changes necessary t...
Andres Löh, Conor McBride, Wouter Swierstra
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
179
Voted
IWPSE
2003
IEEE
15 years 9 months ago
Program Slicing Tool for Effective Software Evolution Using Aspect-Oriented Technique
One of the issues in software evolution is debugging. Debugging large and complex software systems evolved requires a lot of effort since it is very difficult to localize and ide...
Takashi Ishio, Shinji Kusumoto, Katsuro Inoue
PLDI
2004
ACM
15 years 9 months ago
Kill-safe synchronization abstractions
e Synchronization Abstractions “Well, it just so happens that your friend here is only mostly dead. There’s a big difference between mostly dead and all dead.” – Miracle Ma...
Matthew Flatt, Robert Bruce Findler
141
Voted
SIGITE
2004
ACM
15 years 9 months ago
The use of MUPPETS in an introductory java programming course
“The Multi-User Programming Pedagogy for Enhancing Traditional Study” (MUPPETS) system has been under development at RIT for the last three years. This multi-user environment ...
Kevin J. Bierre, Andrew M. Phelps