Sciweavers

7124 search results - page 1185 / 1425
» Programming Languages and Operating Systems
Sort
View
125
Voted
IFIP
2009
Springer
15 years 10 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...
101
Voted
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 10 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
144
Voted
LICS
2008
IEEE
15 years 10 months ago
Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule
Separation logic involves two dual forms of modularity: local reasoning makes part of the store invisible within a static scope, whereas hiding local state makes part of the store...
François Pottier
117
Voted
CC
2007
Springer
118views System Software» more  CC 2007»
15 years 9 months ago
A Practical Escape and Effect Analysis for Building Lightweight Method Summaries
We present a unification-based, context-sensitive escape and effect analysis that infers lightweight method summaries describing heap effects. The analysis is parameterized on two...
Sigmund Cherem, Radu Rugina
119
Voted
CC
2007
Springer
139views System Software» more  CC 2007»
15 years 9 months ago
Using Prefetching to Improve Reference-Counting Garbage Collectors
Reference counting is a classical garbage collection method. Recently, a series of papers have extended the basic method to drastically reduce its notorious overhead and extend the...
Harel Paz, Erez Petrank
« Prev « First page 1185 / 1425 Last » Next »