Sciweavers

6054 search results - page 946 / 1211
» Implementation of Andorra-based Languages
Sort
View
OSDI
1996
ACM
15 years 6 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
CACM
2008
101views more  CACM 2008»
15 years 5 months ago
Just say 'A Class Defines a Data Type'
data type and (Java) class, asking about the relationship between them. The same students would also be unlikely to find an answer in a CS1 textbook. Some textbooks might not even ...
Chenglie Hu
146
Voted
CORR
2006
Springer
143views Education» more  CORR 2006»
15 years 5 months ago
A Knowledge-Based Approach for Selecting Information Sources
Through the Internet and the World-Wide Web, a vast number of information sources has become available, which offer information on various subjects by different providers, often i...
Thomas Eiter, Michael Fink, Hans Tompits
140
Voted
INTERNET
2008
150views more  INTERNET 2008»
15 years 5 months ago
Convenience Over Correctness
ion. First described in RFC 707,1 with implementation approaches and details later provided by Andrew Birrell and Bruce Nelson,2 RPC has influenced distributed systems research and...
Steve Vinoski
153
Voted
JCS
2008
119views more  JCS 2008»
15 years 5 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev