Sciweavers

2777 search results - page 414 / 556
» Example centric programming
Sort
View
CSFW
2006
IEEE
15 years 8 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
DSN
2006
IEEE
15 years 8 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
115
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Multi-Stage Investment Decision under Contingent Demand for Networking Planning
Telecommunication companies, such as Internet and cellular service providers, are seeing rapid and uncertain growth of traffic routed through their networks. It has become a chall...
Miguel F. Anjos, Michael Desroches, Anwar Haque, O...
ICDM
2006
IEEE
111views Data Mining» more  ICDM 2006»
15 years 8 months ago
Social Capital in Friendship-Event Networks
In this paper, we examine a particular form of social network which we call a friendship-event network. A friendship-event network captures both the friendship relationship among ...
Louis Licamele, Lise Getoor
140
Voted
ICPADS
2006
IEEE
15 years 8 months ago
Secure and High-Performance Web Server System for Shared Hosting Service
We developed Hi-sap, a web server system that ensures the security in a server and has high performance when processing dynamic content. In existing servers, server embedded progr...
Daisuke Hara, Yasuichi Nakayama