High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
For more than thirty years, the parallel programming community has used the dependence graph as the main abstraction for reasoning about and exploiting parallelism in āregularā...
Keshav Pingali, Donald Nguyen, Milind Kulkarni, Ma...
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by reļ¬ning the type system of ML with a rest...
AbstractāThis paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme prop...
he signiļ¬cant increase in the available computational power that took place in recent decades has been accompanied by a growing interest in the application of the evolutionary ap...