Sciweavers

4386 search results - page 806 / 878
» A Tamper-Resistant Programming Language System
Sort
View
CADE
2003
Springer
16 years 1 months ago
Foundational Certified Code in a Metalogical Framework
Foundational certified code systems seek to prove untrusted programs to be safe relative to safety policies given in terms of actual machine architectures, thereby improving the s...
Karl Crary, Susmit Sarkar
ER
2009
Springer
167views Database» more  ER 2009»
15 years 8 months ago
FOCIH: Form-Based Ontology Creation and Information Harvesting
Creating an ontology and populating it with data are both labor-intensive tasks requiring a high degree of expertise. Thus, scaling ontology creation and population to the size of ...
Cui Tao, David W. Embley, Stephen W. Liddle
FM
2009
Springer
123views Formal Methods» more  FM 2009»
15 years 8 months ago
"Carbon Credits" for Resource-Bounded Computations Using Amortised Analysis
Abstract. Bounding resource usage is important for a number of areas, notably real-time embedded systems and safety-critical systems. In this paper, we present a fully automatic st...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
APSEC
2008
IEEE
15 years 8 months ago
A Heap Model for Java Bytecode to Support Separation Logic
Memory usage analysis is an important problem for resource-constrained mobile devices, especially under mission- or safety-critical circumstances. Program codes running on or bein...
Chenguang Luo, Guanhua He, Shengchao Qin
ETFA
2008
IEEE
15 years 8 months ago
Evaluation of Sequential Function Charts execution techniques. The Active Steps Algorithm
Programmable Logic Controllers (PLCs) play a significant role in the control of production systems and Sequential Function Chart (SFC) is one of the main programming languages. Th...
Ramon Piedrafita Moreno, José Luis Villarro...