Sciweavers

2257 search results - page 194 / 452
» Secure program partitioning
Sort
View
85
Voted
COMPSEC
2007
52views more  COMPSEC 2007»
15 years 23 days ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
122
Voted
CJ
2010
150views more  CJ 2010»
14 years 10 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
102
Voted
ESOP
2010
Springer
15 years 10 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker
87
Voted
ML
2006
ACM
15 years 6 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
117
Voted
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
15 years 4 months ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi