Sciweavers

70 search results - page 7 / 14
» Safe separators for treewidth
Sort
View
89
Voted
ICONS
2009
IEEE
15 years 4 months ago
Modeling System Safety Requirements Using Input/Output Constraint Meta-automata
Most recent software related accidents have been system accidents. To validate the absence of system hazards concerning dysfunctional interactions, industrials call for approaches...
Zhe Chen, Gilles Motet
77
Voted
COOPIS
1998
IEEE
15 years 1 months ago
Scheduling Non-Enforceable Contracts among Autonomous Agents
With the emergence of fast and standardized communication infrastructures over which separately designed agents of different organizations can interact in real-time, there is an i...
Thomas Tesch, Karl Aberer
83
Voted
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 1 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
APLAS
2004
ACM
15 years 3 months ago
A Functional Language for Logarithmic Space
Abstract. More than being just a tool for expressing algorithms, a welldesigned programming language allows the user to express her ideas efficiently. The design choices however e...
Peter Møller Neergaard
86
Voted
JSC
2010
106views more  JSC 2010»
14 years 8 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...