Sciweavers

1446 search results - page 263 / 290
» Hardware Software Co-Design Using Functional Languages
Sort
View
TOPLAS
2002
98views more  TOPLAS 2002»
15 years 1 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
118
Voted
AOSD
2007
ACM
15 years 6 months ago
An aspect-oriented approach to bypassing middleware layers
The layered architecture of middleware platforms (such as CORBA, SOAP, J2EE) is a mixed blessing. On the one hand, layers provide services such as demarshaling, session management...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
EUROSYS
2010
ACM
15 years 11 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
139
Voted
CCS
2010
ACM
14 years 10 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
ISSTA
2000
ACM
15 years 6 months ago
UML-Based integration testing
Increasing numbers of software developers are using the Unified Modeling Language (UML) and associated visual modeling tools as a basis for the design and implementation of their ...
Jean Hartmann, Claudio Imoberdorf, Michael Meising...