Sciweavers

2111 search results - page 228 / 423
» How to Program Pervasive Systems
Sort
View
109
Voted
CORR
2004
Springer
87views Education» more  CORR 2004»
15 years 3 months ago
Roles Are Really Great!
We present a new role system for specifying changing referencing relationships of heap objects. The role of an object depends, in large part, on its aliasing relationships with ot...
Viktor Kuncak, Patrick Lam, Martin C. Rinard
117
Voted
ISOLA
2004
Springer
15 years 9 months ago
Static Timing Analysis of Real-Time Operating System Code
Methods for Worst-Case Execution Time (WCET) analysis have been known for some time, and recently commercial tools have emerged. However, the technique has so far not been much use...
Daniel Sandell, Andreas Ermedahl, Jan Gustafsson, ...
128
Voted
MINENET
2006
ACM
15 years 9 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
138
Voted
PLDI
2005
ACM
15 years 9 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
135
Voted
ECRTS
2007
IEEE
15 years 10 months ago
Composition Techniques for Tree Communication Schedules
A critical resource in a distributed real-time system is its shared communication medium. Unrestrained concurrent access to the network can lead to collisions that reduce the syst...
Madhukar Anand, Sebastian Fischmeister, Insup Lee