Sciweavers

14824 search results - page 135 / 2965
» Security - Introduction
Sort
View
97
Voted
OOPSLA
2000
Springer
15 years 6 months ago
Improving the Java memory model using CRF
Jan-Willem Maessen, Arvind, Xiaowei Shen
84
Voted
SPW
2000
Springer
15 years 6 months ago
Making Sense of Specifications: The Formalization of SET
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
92
Voted
OOPSLA
1995
Springer
15 years 6 months ago
Sound Polymorphic Type Inference for Objects
Jonathan Eifrig, Scott F. Smith, Valery Trifonov
114
Voted
SP
1991
IEEE
15 years 6 months ago
A Pattern-Oriented Intrusion-Detection Model and Its Applications
Shiuh-Pyng Shieh, Virgil D. Gligor
78
Voted
SP
1987
IEEE
15 years 6 months ago
Toward Verified Execution Environments
William R. Bevier, Warren A. Hunt Jr., William D. ...