Sciweavers

1629 search results - page 218 / 326
» Infeasible Code Detection
Sort
View
SOSP
2009
ACM
15 years 10 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
SAC
2009
ACM
15 years 8 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
ERLANG
2008
ACM
15 years 3 months ago
Gradual typing of erlang programs: a wrangler experience
Currently most Erlang programs contain no or very little type information. This sometimes makes them unreliable, hard to use, and difficult to understand and maintain. In this pap...
Konstantinos F. Sagonas, Daniel Luna
SAC
2008
ACM
15 years 1 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
VTC
2010
IEEE
140views Communications» more  VTC 2010»
14 years 12 months ago
To Cooperate or Not: A Capacity Perspective
Abstract—It is widely recognized that differential decode-andforward (DDF) cooperative transmission scheme is capable of providing a superior performance compared to classic dire...
Li Wang, Lingkun Kong, Soon Xin Ng, Lajos Hanzo