Sciweavers

7530 search results - page 1352 / 1506
» Design and Implementation of the YAWL System
Sort
View
108
Voted
AOSD
2008
ACM
15 years 5 days ago
StrongAspectJ: flexible and safe pointcut/advice bindings
AspectJ was designed as a seamless aspect-oriented extension of the Java programming language. However, unlike Java, AspectJ does not have a safe type system: an accepted binding ...
Bruno De Fraine, Mario Südholt, Viviane Jonck...
ASPLOS
2008
ACM
15 years 4 days ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
ATAL
2008
Springer
15 years 4 days ago
Trackside DEIRA: a dynamic engaging intelligent reporter agent
DEIRA is a virtual agent commenting on virtual horse races in real time. DEIRA analyses the state of the race, acts emotionally and comments about the situation in a believable an...
François L. A. Knoppel, Almer S. Tigelaar, ...
ATC
2008
Springer
15 years 4 days ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich
89
Voted
CCS
2008
ACM
15 years 4 days ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
« Prev « First page 1352 / 1506 Last » Next »