Sciweavers

2111 search results - page 167 / 423
» How to Program Pervasive Systems
Sort
View
WETICE
1997
IEEE
15 years 5 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
102
Voted
POPL
1993
ACM
15 years 4 months ago
Quasi-Static Scoping: Sharing Variable Bindings Across Multiple Lexical Scopes
Static scoping embodies a strong encapsulation mechanism for hiding the details of program units. Yet, it does not allow the sharing of variable bindings locations across indepe...
Shinn-Der Lee, Daniel P. Friedman
98
Voted
SIGCOMM
1994
ACM
15 years 4 months ago
Experiences with a High-Speed Network Adaptor: A Software Perspective
This paper describes our experiences, from a software perspective, with the OSIRIS network adaptor. It first identifies the problems we encountered while programming OSIRIS and op...
Peter Druschel, Larry L. Peterson, Bruce S. Davie
CACM
2010
113views more  CACM 2010»
15 years 28 days ago
Reasoning about the unknown in static analysis
Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis time. While such unknown values need to be treated as ...
Isil Dillig, Thomas Dillig, Alex Aiken
91
Voted
LCTRTS
2001
Springer
15 years 5 months ago
Combining Global Code and Data Compaction
Computers are increasingly being incorporated in devices with a limited amount of available memory. As a result research is increasingly focusing on the automated reduction of pro...
Bjorn De Sutter, Bruno De Bus, Koenraad De Bossche...