Sciweavers

194 search results - page 20 / 39
» An Exception Monitoring System for Java
Sort
View
CSFW
2006
IEEE
15 years 5 months ago
Noninterference in the Presence of Non-Opaque Pointers
A common theoretical assumption in the study of information flow security in Java-like languages is that pointers are opaque – i.e., that the only properties that can be observ...
Daniel Hedin, David Sands
ACSC
2004
IEEE
15 years 3 months ago
Strength Reduction for Loop-Invariant Types
Types are fundamental for enforcing levels of abstraction in modern high-level programming languages and their lower-level representations. However, some type-related features suc...
Phung Hua Nguyen, Jingling Xue
BMCBI
2007
195views more  BMCBI 2007»
14 years 11 months ago
NeuroTerrain - a client-server system for browsing 3D biomedical image data sets
Background: Three dimensional biomedical image sets are becoming ubiquitous, along with the canonical atlases providing the necessary spatial context for analysis. To make full us...
Carl Gustafson, William J. Bug, Jonathan Nissanov
ECRTS
2000
IEEE
15 years 4 months ago
Prototyping distributed multimedia systems using communicating real-time state machines
This paper describes a methodology for the development of real-time systems and shows its application to the modeling, analysis and implementation of distributed multimedia system...
Giancarlo Fortino, Libero Nigro
ECBS
2003
IEEE
145views Hardware» more  ECBS 2003»
15 years 5 months ago
Model Checking and Evidence Exploration
We present an algebraic framework for evidence exploration: the process of interpreting, manipulating, and navigating the proof structure or evidence produced by a model checker w...
Yifei Dong, C. R. Ramakrishnan, Scott A. Smolka