Sciweavers

4386 search results - page 653 / 878
» A Tamper-Resistant Programming Language System
Sort
View
ESOP
2009
Springer
15 years 10 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
179
Voted
PLDI
2003
ACM
15 years 8 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
259
Voted

Book
372views
16 years 11 months ago
EJB Design Patterns
"EJB Design Patterns goes beyond high-level design pattern descriptions into critical EJB-specific implementation issues, illustrated with source code implementations. The boo...
Floyd Marinescu
214
Voted
CP
2009
Springer
16 years 4 months ago
Hull Consistency under Monotonicity
We prove that hull consistency for a system of equations or inequalities can be achieved in polynomial time providing that the underlying functions are monotone with respect to eac...
Gilles Chabert, Luc Jaulin
CC
2010
Springer
179views System Software» more  CC 2010»
15 years 10 months ago
Validating Register Allocation and Spilling
Abstract. Following the translation validation approach to highassurance compilation, we describe a new algorithm for validating a posteriori the results of a run of register alloc...
Silvain Rideau, Xavier Leroy