Sciweavers

1599 search results - page 235 / 320
» Program Analysis for Security and Privacy
Sort
View
OOPSLA
2007
Springer
15 years 9 months ago
Swashup: situational web applications mashups
Distributed programming has shifted from private networks to the Internet using heterogeneous Web APIs. This enables the creation of situational applications of composed services ...
E. Michael Maximilien, Ajith Ranabahu, Stefan Tai
119
Voted
SAFECOMP
2007
Springer
15 years 9 months ago
Software Encoded Processing: Building Dependable Systems with Commodity Hardware
In future, the decreasing feature size and the reduced power supply will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in...
Ute Wappler, Christof Fetzer
OOPSLA
2009
Springer
15 years 8 months ago
Relooper: refactoring for loop parallelism in Java
In the multicore era, sequential programs need to be refactored for parallelism. The next version of Java provides ParallelArray, an array datastructure that supports parallel ope...
Danny Dig, Mihai Tarce, Cosmin Radoi, Marius Minea...
HYBRID
2009
Springer
15 years 10 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
124
Voted
MSCS
2010
84views more  MSCS 2010»
15 years 2 months ago
Channel abstractions for network security
Abstractions for Network Security† MICH E L E B U G L I E S I, R I C C A R D O F O C A R D I Dipartimento di Informatica, Universit`a Ca’ Foscari, Venice. Received 6 October 20...
Michele Bugliesi, Riccardo Focardi