Sciweavers

1183 search results - page 106 / 237
» On flow-sensitive security types
Sort
View
OOPSLA
2001
Springer
15 years 9 months ago
An On-the-Fly Reference Counting Garbage Collector for Java
Reference counting is not naturally suitable for running on multiprocessors. The update of pointers and reference counts requires atomic and synchronized operations. We present a ...
Yossi Levanoni, Erez Petrank
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 9 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
SAFECOMP
1998
Springer
15 years 8 months ago
Fault-Tolerant Communication in Large-Scale Manipulators
Abstract. In this paper concepts for fault-tolerant communication systems in large-scale manipulators for heavy weights are introduced. This class of robots makes high demands on s...
Hans-Dieter Kochs, Walter Geisselhardt, Holger Hil...
AGENTS
1997
Springer
15 years 8 months ago
Linearly Anticipatory Autonomous Agents
Abstract. A special kind of anticipation is when an anticipated undesired situation makes an agent adapt its behavior in order to prevent that this situation will occur. In this ch...
Paul Davidsson
PDPTA
2004
15 years 6 months ago
Hierarchical Scheduling for State-based Services
Abstract-- Service descriptions based on type hiernd abstract service states ruling the availability of operations permit more secure service combinations in distributed systems de...
Jens Bruhn, Sven Kaffille, Guido Wirtz