Sciweavers

1234 search results - page 164 / 247
» Privacy-preserving Virtual Machine
Sort
View
232
Voted
ACMMSP
2006
ACM
278views Hardware» more  ACMMSP 2006»
15 years 9 months ago
Atomicity via source-to-source translation
We present an implementation and evaluation of atomicity (also known as software transactions) for a dialect of Java. Our implementation is fundamentally different from prior work...
Benjamin Hindman, Dan Grossman
137
Voted
PPPJ
2006
ACM
15 years 9 months ago
Dynamic analysis of program concepts in Java
Concept assignment identifies units of source code that are functionally related, even if this is not apparent from a syntactic point of view. Until now, the results of concept a...
Jeremy Singer, Chris C. Kirkham
124
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Generating Policies for Defense in Depth
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
132
Voted
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
15 years 9 months ago
Security Analysis of Mobile Java
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
132
Voted
ICDAR
2005
IEEE
15 years 9 months ago
Text Recognition of Low-resolution Document Images
Cheap and versatile cameras make it possible to easily and quickly capture a wide variety of documents. However, low resolution cameras present a challenge to OCR because it is vi...
Charles E. Jacobs, Patrice Y. Simard, Paul A. Viol...