Sciweavers

1760 search results - page 159 / 352
» Program Analysis Using Weighted Pushdown Systems
Sort
View
127
Voted
PODS
2005
ACM
151views Database» more  PODS 2005»
16 years 27 days ago
Estimating arbitrary subset sums with few probes
Suppose we have a large table T of items i, each with a weight wi, e.g., people and their salary. In a general preprocessing step for estimating arbitrary subset sums, we assign e...
Noga Alon, Nick G. Duffield, Carsten Lund, Mikkel ...
91
Voted
FMCO
2007
Springer
15 years 7 months ago
COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode
This paper describes the architecture of costa, an abstract interpretation based cost and termination analyzer for Java bytecode. The system receives as input a bytecode program, (...
Elvira Albert, Puri Arenas, Samir Genaim, German P...
105
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 23 days ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
91
Voted
ICSE
2007
IEEE-ACM
16 years 25 days ago
A Sound Assertion Semantics for the Dependable Systems Evolution Verifying Compiler
The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or c...
Patrice Chalin
222
Voted
POPL
2006
ACM
16 years 1 months ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam