Sciweavers

890 search results - page 79 / 178
» Programming language methods in computer security
Sort
View
124
Voted
OOPSLA
2010
Springer
14 years 10 months ago
Towards a tool-based development methodology for sense/compute/control applications
This poster presents a design language and a tool suite covering the development life-cycle of a Sense/Compute/Control (SCC) application. This language makes it possible to define...
Damien Cassou, Julien Bruneau, Julien Mercadal, Qu...
191
Voted
POPL
2006
ACM
16 years 26 days ago
Verifying properties of well-founded linked lists
We describe a novel method for verifying programs that manipulate linked lists, based on two new predicates that characterize reachability of heap cells. These predicates allow re...
Shuvendu K. Lahiri, Shaz Qadeer
113
Voted
ACL
1998
15 years 1 months ago
Project for Production of Closed-Caption TV Programs for the Hearing Impaired
We describe an on-going project whose primary aim is to establish the technology of producing closed captions for TV news programs efficiently using natural language processing an...
Takahiro Wakao, Eiji Sawamura, Terumasa Ehara, Ich...
99
Voted
LICS
2009
IEEE
15 years 7 months ago
Clipping: A Semantics-Directed Syntactic Approximation
In this paper we introduce “clipping,” a new method of syntactic approximation which is motivated by and works in conjunction with a sound and decidable denotational model for...
Dan R. Ghica, Adam Bakewell
90
Voted
IFIP
2009
Springer
15 years 7 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio