Sciweavers

248 search results - page 31 / 50
» Authentication Primitives and Their Compilation
Sort
View
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 2 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
VSTTE
2005
Springer
15 years 3 months ago
Reasoning about Object Structures Using Ownership
Abstract. Many well-established concepts of object-oriented programming work for individual objects, but do not support object structures. The development of a verifying compiler r...
Peter Müller
APSEC
1999
IEEE
15 years 2 months ago
The Quest for Correct Systems: Model Checking of Diagrams and Datatypes
For the practical development of provably correct software for embedded systems the close integration of CASE tools and verification tools is required. This paper describes the co...
Jan Philipps, Oscar Slotosch
OOPSLA
1999
Springer
15 years 2 months ago
Mostly-copying Reachability-based Orthogonal Persistence
We describe how reachability-based orthogonal persistence can be supported even in uncooperative implementations of languages such as C++ and Modula-3, and without modification t...
Antony L. Hosking, Jiawan Chen
IPPS
1998
IEEE
15 years 2 months ago
Efficient Fine-Grain Thread Migration with Active Threads
Thread migration is established as a mechanism for achieving dynamic load sharing. However, fine-grained migration has not been used due to the high thread and messaging overheads...
Boris Weissman, Benedict Gomes, Jürgen Quitte...