Sciweavers

3796 search results - page 280 / 760
» Presentations by Programmers for Programmers
Sort
View
126
Voted
ICFP
2003
ACM
16 years 3 months ago
An effective theory of type refinements
We develop an explicit two level system that allows programmers to reason about the behavior of effectful programs. The first level is an ordinary ML-style type system, which conf...
Yitzhak Mandelbaum, David Walker, Robert Harper
123
Voted
ICCD
2006
IEEE
133views Hardware» more  ICCD 2006»
16 years 17 days ago
Patching Processor Design Errors
— Microprocessors can have design errors that escape the test and validation process. The cost to rectify these errors after shipping the processors can be very expensive as it m...
Satish Narayanasamy, Bruce Carneal, Brad Calder
127
Voted
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 10 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...
127
Voted
FM
2009
Springer
104views Formal Methods» more  FM 2009»
15 years 10 months ago
Verifying Information Flow Control over Unbounded Processes
Abstract. Decentralized Information Flow Control (DIFC) systems enable programmers to express a desired DIFC policy, and to have the policy enforced via a reference monitor that re...
William R. Harris, Nicholas Kidd, Sagar Chaki, Som...
123
Voted
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 10 months ago
Acquiring change models for sensor-based robot manipulation
—The aim of this paper is to enable a programmer to easily employ external sensors for flexible robot manipulation. We describe a general approach to determine the relation betwe...
Jan Deiterding, Dominik Henrich