Sciweavers

4386 search results - page 692 / 878
» A Tamper-Resistant Programming Language System
Sort
View
115
Voted
OOPSLA
2010
Springer
15 years 1 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
111
Voted
PVLDB
2010
122views more  PVLDB 2010»
15 years 1 months ago
Avalanche-Safe LINQ Compilation
We report on a query compilation technique that enables the construction of alternative efficient query providers for Microsoft’s Language Integrated Query (LINQ) framework. LIN...
Torsten Grust, Jan Rittinger, Tom Schreiber
129
Voted
IPPS
2010
IEEE
15 years 1 months ago
A PRAM-NUMA model of computation for addressing low-TLP workloads
It is possible to implement the parallel random access machine (PRAM) on a chip multiprocessor (CMP) efficiently with an emulated shared memory (ESM) architecture to gain easy par...
Martti Forsell
147
Voted
CSFW
2011
IEEE
14 years 3 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
148
Voted
POPL
1999
ACM
15 years 7 months ago
Types for Mobile Ambients
An ambient is a named cluster of processes and subambients, which moves as a group. We describe type systems able to guarantee that certain ambients will remain immobile, and that ...
Luca Cardelli, Andrew D. Gordon