Sciweavers

386 search results - page 45 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
112
Voted
ICFP
1999
ACM
15 years 6 months ago
Atomic Heap Transactions and Fine-grain Interrupts
Languages such as Java, ML, Scheme, and Haskell provide automatic storage management, that is, garbage collection. The two fundamental operations performed on a garbagecollected h...
Olin Shivers, James W. Clark, Roland McGrath
OOPSLA
2007
Springer
15 years 8 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
TMC
2010
179views more  TMC 2010»
15 years 8 days ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
ASSETS
2004
ACM
15 years 7 months ago
Nonvisual tool for navigating hierarchical structures
The hierarchical structure of a program can be quite complex. As such, many Integrated Development Environments (IDEs) provide graphical representations of program structure at di...
Ann C. Smith, Justin S. Cook, Joan M. Francioni, A...
160
Voted
POPL
1989
ACM
15 years 6 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott