Sciweavers

2756 search results - page 342 / 552
» Computation-Centric Memory Models
Sort
View
ESOP
2003
Springer
15 years 9 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
143
Voted
EUROSYS
2010
ACM
15 years 9 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
ANSS
2000
IEEE
15 years 9 months ago
Flow Control and Dynamic Load Balancing in Time Warp
We present, in this paper, an algorithm which integrates flow control and dynamic load balancing in Time Warp. The algorithm is intended for use in a distributed memory environme...
Myongsu Choe, Carl Tropper
COMGEO
2011
ACM
14 years 8 months ago
Physical world as an internet of things
ABSTRACT . Categories and Subject Descriptors K. Computing Milieux K.m MISCELLANEOUS General Terms Theory Keywords Cyber-physics, Internet of Things, Quantum computing Cloud Comput...
Simon Berkovich
IACR
2011
221views more  IACR 2011»
14 years 4 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...