Sciweavers

4386 search results - page 709 / 878
» A Tamper-Resistant Programming Language System
Sort
View
117
Voted
ICSM
2008
IEEE
15 years 9 months ago
Non-invasive and non-scattered annotations for more robust pointcuts
Annotations are often mentioned as a potential alternative to tackle the fragile nature of AspectJ pointcuts. However, annotations themselves can be considered crosscutting elemen...
Leonardo Silva, Samuel Domingues, Marco Tulio de O...
116
Voted
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
15 years 9 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...
110
Voted
ICESS
2007
Springer
15 years 9 months ago
A Code Generation Framework for Actor-Oriented Models with Partial Evaluation
Embedded software requires concurrency formalisms other than threads and mutexes used in traditional programming languages like C. Actor-oriented design presents a high level abstr...
Gang Zhou, Man-Kit Leung, Edward A. Lee
IFIP
2007
Springer
15 years 9 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
112
Voted
IFIP
2007
Springer
15 years 9 months ago
Identity as a Service - Towards a Service-Oriented Identity Management Architecture
Service-oriented architecture (SOA) will form the basis of future information systems. Web services are a promising way to implement SOA enabling the loose coupling of functionalit...
Christian Emig, Frank Brandt, Sebastian Kreuzer, S...