Sciweavers

123 search results - page 22 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
PLDI
2003
ACM
15 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
OOPSLA
2005
Springer
15 years 3 months ago
Fine-grained interoperability through mirrors and contracts
As a value flows across the boundary between interoperating languages, it must be checked and converted to fit the types and representations of the target language. For simple f...
Kathryn E. Gray, Robert Bruce Findler, Matthew Fla...
COOTS
1997
14 years 11 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
IANDC
2007
152views more  IANDC 2007»
14 years 9 months ago
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that pre...
Michael Backes, Birgit Pfitzmann, Michael Waidner
VISUALIZATION
2005
IEEE
15 years 3 months ago
Reconstructing Manifold and Non-Manifold Surfaces from Point Clouds
This paper presents a novel approach for surface reconstruction from point clouds. The proposed technique is general in the sense that it naturally handles both manifold and non-m...
Jianning Wang, Manuel M. Oliveira, Arie E. Kaufman