Sciweavers

4386 search results - page 612 / 878
» A Tamper-Resistant Programming Language System
Sort
View
EUROSYS
2009
ACM
16 years 27 days ago
Dingo: taming device drivers
Device drivers are notorious for being a major source of failure in operating systems. In analysing a sample of real defects in Linux drivers, we found that a large proportion (39...
Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heise...
ESOP
2001
Springer
15 years 8 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
119
Voted
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
15 years 9 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
CC
2004
Springer
177views System Software» more  CC 2004»
15 years 9 months ago
Value-Based Partial Redundancy Elimination
Abstract. Partial redundancy elimination (PRE) is a program transformation that identifies and eliminates expressions that are redundant on at least one (but not necessarily all) ...
Thomas VanDrunen, Antony L. Hosking
APCSAC
2000
IEEE
15 years 7 months ago
Dataflow Java: Implicitly Parallel Java
Dataflow computation models enable simpler and more efficient management of the memory hierarchy - a key barrier to the performance of many parallel programs. This paper describes...
Gareth Lee, John Morris