Sciweavers

551 search results - page 91 / 111
» Software Implemented Fault Tolerance Technologies and Experi...
Sort
View
WWW
2008
ACM
16 years 2 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
ASSETS
2009
ACM
14 years 11 months ago
3DScan: an environment control system supporting persons with severe motor impairments
This proposal is about a poster dealing with a scanningbased software system, which aims at giving persons with severe motor impairments a means to interact with their immediate e...
Torsten Felzer, Stephan Rinderknecht
ADAEUROPE
2000
Springer
15 years 6 months ago
(True) Polymorphism in SPARK2000
of the Reliant Telco Platform, K. Wiesneth Safety-oriented INTERBUS INTERBUS Safety-, K. Meyer-Graefe Developing a Binding Process for Automated Program Recognition and Fault Local...
Tse-Min Lin, John A. McDermid
OSDI
1996
ACM
15 years 3 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
ICST
2011
IEEE
14 years 5 months ago
Constraint-Based Program Debugging Using Data Structure Repair
—Developers have used data structure repair over the last few decades as an effective means to recover on-the-fly from errors in program state. Traditional repair techniques wer...
Muhammad Zubair Malik, Junaid Haroon Siddiqui, Sar...