Sciweavers

1757 search results - page 69 / 352
» Secure Content Validation
Sort
View
125
Voted
HPCA
2005
IEEE
16 years 3 months ago
Predicting Inter-Thread Cache Contention on a Chip Multi-Processor Architecture
This paper studies the impact of L2 cache sharing on threads that simultaneously share the cache, on a Chip Multi-Processor (CMP) architecture. Cache sharing impacts threads non-u...
Dhruba Chandra, Fei Guo, Seongbeom Kim, Yan Solihi...
ISW
2007
Springer
15 years 9 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...
ICIW
2007
IEEE
15 years 7 months ago
Type-Based Static and Dynamic Website Verification
Abstract-- Maintaining large websites and verifying their semantic content is a difficult task. In this paper we propose a framework for syntactic validation, semantic verification...
Jorge Coelho, Mário Florido
SYNTHESE
2011
78views more  SYNTHESE 2011»
14 years 10 months ago
Is structural underdetermination possible?
Structural realism is sometimes said to undermine the theory underdetermination (TUD) argument against realism, since, in usual TUD scenarios, the supposed underdetermination conc...
Holger Lyre
CSFW
2004
IEEE
15 years 7 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith