Sciweavers

4722 search results - page 502 / 945
» Encoding Program Executions
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
.NET Security: Lessons Learned and Missed from Java
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
137
Voted
CSL
2004
Springer
15 years 8 months ago
A Functional Scenario for Bytecode Verification of Resource Bounds
We consider a scenario where (functional) programs in pre-compiled form are exchanged among untrusted parties. Our contribution is a system of annotations for the code that can be ...
Roberto M. Amadio, Solange Coupet-Grimal, Silvano ...
EUROPAR
1997
Springer
15 years 8 months ago
The Performance Potential of Value and Dependence Prediction
Abstract. The serialization constraints induced by the detection and enforcement of true data dependences have always been regarded as requirements for correct execution. We propos...
Mikko H. Lipasti, John Paul Shen
ECAL
1995
Springer
15 years 8 months ago
A New Self-Reproducing Cellular Automaton Capable of Construction and Computation
We present a new self-reproducing cellular automaton capable of construction and computation beyond self-reproduction. Our automaton makes use of some of the concepts developed by...
Gianluca Tempesti
130
Voted
VLDB
1995
ACM
96views Database» more  VLDB 1995»
15 years 8 months ago
The Fittest Survives: An Adaptive Approach to Query Optimization
Traditionally, optimizers are “programmed” to optimize queries following a set of buildin procedures. However, optimizers should be robust to its changing environment to gener...
Hongjun Lu, Kian-Lee Tan, Son Dao