Sciweavers

1835 search results - page 176 / 367
» Functional Programming of Behavior-Based Systems
Sort
View
145
Voted
MOZ
2004
Springer
15 years 10 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
141
Voted
FCCM
2000
IEEE
122views VLSI» more  FCCM 2000»
15 years 9 months ago
Evaluating Hardware Compilation Techniques
Hardware compilation techniques which use highlevel programming languages to describe and synthesize hardware are gaining popularity. They are especially useful for reconfigurable...
Markus Weinhardt, Wayne Luk
ICFP
2004
ACM
16 years 5 months ago
Translating dependency into parametricity
Abadi et al. introduced the dependency core calculus (DCC) as a unifying framework to study many important program analyses such as binding time, information flow, slicing, and fu...
Stephen Tse, Steve Zdancewic
138
Voted
WCRE
1997
IEEE
15 years 8 months ago
Reverse Engineering is Reverse Forward Engineering
Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering per...
Ira D. Baxter, Michael Mehlich
130
Voted
TCSB
2008
15 years 5 months ago
Robustness to Code and Data Deletion in Autocatalytic Quines
Abstract. Software systems nowadays are becoming increasingly complex and vulnerable to all sorts of failures and attacks. There is a rising need for robust self-repairing systems ...
Thomas Meyer, Daniel Schreckling, Christian F. Tsc...