Sciweavers

2144 search results - page 112 / 429
» Exact Flow Analysis
Sort
View
JCS
2006
118views more  JCS 2006»
15 years 4 months ago
Enforcing Robust Declassification and Qualified Robustness
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems release sensitive information as part of their in...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
ESOP
2006
Springer
15 years 8 months ago
Path Optimization in Programs and Its Application to Debugging
We present and solve a path optimization problem on programs. Given a set of program nodes, called critical nodes, we find a shortest path through the program's control flow g...
Akash Lal, Junghee Lim, Marina Polishchuk, Ben Lib...
ESTIMEDIA
2006
Springer
15 years 8 months ago
Loop Nest Splitting for WCET-Optimization and Predictability Improvement
This paper presents the influence of the loop nest splitting source code optimization on the worst-case execution time (WCET). Loop nest splitting minimizes the number of executed...
Heiko Falk, Martin Schwarzer
ECSA
2010
Springer
15 years 5 months ago
Model-based enhancement of software performance for precision critical systems
Architectural level analysis of a software system for its quality attributes is a proven cost-effective approach. This is particularly significant for performance, which defines m...
Naeem Muhammad, Nelis Boucké, Yolande Berbe...
MAS
1998
Springer
119views Communications» more  MAS 1998»
15 years 8 months ago
Environmental Key Generation Towards Clueless Agents
In this paper, we introduce a collection of cryptographic key constructions built from environmental data that are resistant to adversarial analysis and deceit. We expound upon the...
James Riordan, Bruce Schneier