Sciweavers

4386 search results - page 470 / 878
» A Tamper-Resistant Programming Language System
Sort
View
116
Voted
EMSOFT
2009
Springer
15 years 11 months ago
Probabilistic modeling of data cache behavior
In this paper, we propose a formal analysis approach to estimate the expected (average) data cache access time of an application across all possible program inputs. Towards this g...
Vinayak Puranik, Tulika Mitra, Y. N. Srikant
133
Voted
CC
2003
Springer
15 years 9 months ago
Improving Data Locality by Chunking
Cache memories were invented to decouple fast processors from slow memories. However, this decoupling is only partial, and many researchers have attempted to improve cache use by p...
Cédric Bastoul, Paul Feautrier
POPL
2008
ACM
16 years 4 months ago
High-level small-step operational semantics for transactions
Software transactions have received significant attention as a way to simplify shared-memory concurrent programming, but insufficient focus has been given to the precise meaning o...
Katherine F. Moore, Dan Grossman
POPL
2006
ACM
16 years 4 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
159
Voted
ICSM
2005
IEEE
15 years 10 months ago
Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software
Aspect oriented programming has been proposed as a way to improve modularity of software systems by allowing encapsulation of cross-cutting concerns. To do so, aspects specify whe...
Maximilian Störzer, Jürgen Graf