Sciweavers

4386 search results - page 601 / 878
» A Tamper-Resistant Programming Language System
Sort
View
CC
2007
Springer
109views System Software» more  CC 2007»
15 years 10 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
CC
2005
Springer
120views System Software» more  CC 2005»
15 years 9 months ago
Data Slicing: Separating the Heap into Independent Regions
In this paper, we present a formal description of data slicing, which is a type-directed program transformation technique that separates a program’s heap into several independent...
Jeremy Condit, George C. Necula
ADAEUROPE
2004
Springer
15 years 9 months ago
High-Integrity Interfacing to Programmable Logic with Ada
Abstract. Programmable logic devices (PLDs) are now common components of safety-critical systems, and are increasingly used for safetyrelated or safety-critical functionality. Rece...
Adrian J. Hilton, Jon G. Hall
DFG
2004
Springer
15 years 9 months ago
A Unifying Semantics for Sequential Function Charts
Programmable Logic Controllers (PLC) are widely used as device controllers for assembly lines, chemical processes, or power plants. Sequential Function Charts (SFC) form one of the...
Nanette Bauer, Ralf Huuck, Ben Lukoschus, Sebastia...
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 3 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...