Sciweavers

174 search results - page 24 / 35
» Exceptionally Safe Futures
Sort
View
ECOOP
1999
Springer
15 years 4 months ago
Inlining of Virtual Methods
We discuss aspects of inlining of virtual method invocations. First, we introduce a new method test to guard inlinings of such invocations, with a di erent set of tradeo s from the...
David Detlefs, Ole Agesen
NDSS
1998
IEEE
15 years 4 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
DSN
2006
IEEE
15 years 3 months ago
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance
This paper presents our experience validating the flood tolerance of two network interface card (NIC)-based embedded firewall solutions, the Embedded Firewall (EFW) and the Autono...
Michael Ihde, William H. Sanders
ICSE
1995
IEEE-ACM
15 years 3 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
HCI
2007
15 years 1 months ago
Situation Awareness and Secondary Task Performance While Driving
For safe driving it is necessary that the drivers perceive the relevant objects of a situation, comprehend the meaning of these objects to form a holistic understanding of the curr...
Martin R. K. Baumann, Diana Rösler, Josef F. ...