Sciweavers

192 search results - page 15 / 39
» Non-Deterministic Games and Program Analysis: An Application...
Sort
View
OOPSLA
2004
Springer
15 years 3 months ago
Chianti: a tool for change impact analysis of java programs
This paper reports on the design and implementation of Chianti, a change impact analysis tool for Java that is implemented in the context of the Eclipse environment. Chianti analy...
Xiaoxia Ren, Fenil Shah, Frank Tip, Barbara G. Ryd...
IWIA
2005
IEEE
15 years 3 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ERSA
2009
109views Hardware» more  ERSA 2009»
14 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
TSE
2011
165views more  TSE 2011»
14 years 4 months ago
Bristlecone: Language Support for Robust Software Applications
— We present Bristlecone, a programming language for robust software systems. Bristlecone applications have two components: a high-level organization specification that describe...
Brian Demsky, Sivaji Sundaramurthy
CCS
2010
ACM
14 years 10 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...