Sciweavers

4386 search results - page 734 / 878
» A Tamper-Resistant Programming Language System
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 9 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ASPLOS
2006
ACM
15 years 9 months ago
Supporting nested transactional memory in logTM
Nested transactional memory (TM) facilitates software composition by letting one module invoke another without either knowing whether the other uses transactions. Closed nested tr...
Michelle J. Moravan, Jayaram Bobba, Kevin E. Moore...
UIST
2006
ACM
15 years 9 months ago
Translating keyword commands into executable code
Modern applications provide interfaces for scripting, but many users do not know how to write script commands. However, many users are familiar with the idea of entering keywords ...
Greg Little, Robert C. Miller
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
15 years 8 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck
ATVA
2005
Springer
202views Hardware» more  ATVA 2005»
15 years 8 months ago
Model Checking Real Time Java Using Java PathFinder
Abstract. The Real Time Specification for Java (RTSJ) is an augmentation of Java for real time applications of various degrees of hardness. The central features of RTSJ are real t...
Gary Lindstrom, Peter C. Mehlitz, Willem Visser