Sciweavers

2957 search results - page 320 / 592
» Code analysis and CS-XML
Sort
View
VLDB
1987
ACM
109views Database» more  VLDB 1987»
15 years 7 months ago
The Design of the POSTGRES Storage System
This paper presents the design of the storage system for the POSTGRES data base system under construction at Berkeley. It is novel in several ways. First, the storage manager supp...
Michael Stonebraker
IASTEDSEA
2004
15 years 5 months ago
Java bytecode verification with dynamic structures
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
Cinzia Bernardeschi, Luca Martini, Paolo Masci
SOSP
1997
ACM
15 years 5 months ago
A Decentralized Model for Information Flow Control
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Andrew C. Myers, Barbara Liskov
IJNSEC
2007
156views more  IJNSEC 2007»
15 years 4 months ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
TSP
2008
87views more  TSP 2008»
15 years 4 months ago
A Proof of Convergence of the MAP Turbo-Detector to the AWGN Case
In this paper, we consider a coded transmission over a frequency selective channel. We propose to study analytically the convergence of the turbo-detector using a maximum a poster...
Noura Sellami, Aline Roumy, Inbar Fijalkow