Sciweavers

3708 search results - page 598 / 742
» Programming with C Exceptions
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 10 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
CASES
2003
ACM
15 years 10 months ago
Compiler optimization and ordering effects on VLIW code compression
Code size has always been an important issue for all embedded applications as well as larger systems. Code compression techniques have been devised as a way of battling bloated co...
Montserrat Ros, Peter Sutton
ELPUB
2003
ACM
15 years 10 months ago
The Omnipaper Metadata RDF/XML Prototype Implementation
Omnipaper (Smart Access to European Newspapers, IST-2001-32174) is a project from the European Commission IST program (Information Society Technologies) that investigates and prop...
Teresa Susana Mendes Pereira, Ana Alice Baptista
CCS
2003
ACM
15 years 10 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
ICS
2003
Tsinghua U.
15 years 10 months ago
Roccom: an object-oriented, data-centric software integration framework for multiphysics simulations
We describe an object-oriented software integration frameccom, abstracted from our five years of experience in developing a complex, integrated code for rocket simulation. Roccom...
Xiangmin Jiao, Michael T. Campbell, Michael T. Hea...