Sciweavers

2019 search results - page 180 / 404
» Programming with Shared Data Abstractions
Sort
View
SRDS
2003
IEEE
15 years 8 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
CSFW
2004
IEEE
15 years 7 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
ICFP
2007
ACM
16 years 3 months ago
A type system for recursive modules
There has been much work in recent years on extending ML with recursive modules. One of the most difficult problems in the development of such an extension is the double vision pr...
Derek Dreyer
CDVE
2007
Springer
112views Visualization» more  CDVE 2007»
15 years 9 months ago
VICA: A Voronoi Interface for Visualizing Collaborative Annotations
Abstract. Large-scale scientific investigation often includes collaborative data exploration among geographically distributed researchers. The tools used for this exploration typi...
Yue Wang, James Shearer, Kwan-Liu Ma
ICCS
2005
Springer
15 years 8 months ago
Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications such as data dissemination services, information sharing, service discovery, etc...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...