Sciweavers

4386 search results - page 574 / 878
» A Tamper-Resistant Programming Language System
Sort
View
IWPC
2008
IEEE
15 years 10 months ago
Exploiting Runtime Information in the IDE
Developers rely on the mechanisms provided by their IDE to browse and navigate a large software system. These mechanisms are usually based purely on a system’s static source cod...
David Röthlisberger, Orla Greevy, Oscar Niers...
139
Voted
PPSC
1993
15 years 5 months ago
I/O for TFLOPS Supercomputers
Scalable parallel computers with TFLOPS (Trillion FLoating Point Operations Per Second) performance levels are now under construction. While we believe TFLOPS processor technology...
Erik DeBenedictis, Stephen C. Johnson
ECOOP
1998
Springer
15 years 8 months ago
Mobile Objects and Mobile Agents: The Future of Distributed Computing?
This paper will lead you into the world of mobile agents, an emerging technology that makes it very much easier to design, implement, and maintain distributed systems. You will fin...
Danny B. Lange
160
Voted
TLDI
2005
ACM
151views Formal Methods» more  TLDI 2005»
15 years 9 months ago
Strict bidirectional type checking
Completely annotated lambda terms (such as are arrived at via the straightforward encodings of various types from System F) contain much redundant type information. Consequently, ...
Adam J. Chlipala, Leaf Petersen, Robert Harper
POPL
2012
ACM
13 years 11 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan