Sciweavers

890 search results - page 35 / 178
» Programming language methods in computer security
Sort
View
107
Voted
IFL
2004
Springer
15 years 5 months ago
A Virtual Machine for Functional Logic Computations
Abstract. We describe the architecture of a virtual machine for executing functional logic programming languages. A distinguishing feature of our machine is that it preserves the o...
Sergio Antoy, Michael Hanus, Jimeng Liu, Andrew P....
103
Voted
ASPLOS
2008
ACM
15 years 2 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
89
Voted
SIAMSC
2008
108views more  SIAMSC 2008»
15 years 13 days ago
Automated Code Generation for Discontinuous Galerkin Methods
A compiler approach for generating low-level computer code from high-level input for discontinuous Galerkin finite element forms is presented. The input language mirrors convention...
Kristian B. Ølgaard, Anders Logg, Garth N. ...
95
Voted
IIWAS
2007
15 years 2 months ago
An Extensible Framework for Database Security Assessment and Visualization
By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
Tran Khanh Dang, Thieu Hoa Le, Duy Tin Truong
DATE
2010
IEEE
183views Hardware» more  DATE 2010»
15 years 5 months ago
Multithreaded code from synchronous programs: Extracting independent threads for OpenMP
—Synchronous languages offer a deterministic model of concurrency at the level of actions. However, essentially all compilers for synchronous languages compile these actions into...
Daniel Baudisch, Jens Brandt, Klaus Schneider