Sciweavers

686 search results - page 83 / 138
» Foundations for Bidirectional Programming
Sort
View
POPL
2004
ACM
15 years 10 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
ESSOS
2010
Springer
15 years 6 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
15 years 4 months ago
An Integrated Architecture for Demand Response Communications and Control
1 In the competitive electricity structure, demand response programs enable customers to react dynamically to changes in electricity prices. The implementation of such programs ma...
Michael LeMay, Rajesh Nelli, George Gross, Carl A....
CCS
2005
ACM
15 years 3 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
SIGCSE
2010
ACM
150views Education» more  SIGCSE 2010»
15 years 3 months ago
Expanding the frontiers of computer science: designing a curriculum to reflect a diverse field
While the discipline of computing has evolved significantly in the past 30 years, Computer Science curricula have not as readily adapted to these changes. In response, we have rec...
Mehran Sahami, Alex Aiken, Julie Zelenski