Sciweavers

1559 search results - page 179 / 312
» The Semantics of Future and Its Use in Program Optimizations
Sort
View
81
Voted
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
15 years 2 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
59
Voted
MPC
2004
Springer
116views Mathematics» more  MPC 2004»
15 years 3 months ago
An Injective Language for Reversible Computation
Abstract. Erasure of information incurs an increase in entropy and dissipates heat. Therefore, information-preserving computation is essential for constructing computers that use e...
Shin-Cheng Mu, Zhenjiang Hu, Masato Takeichi
91
Voted
ECOOP
2010
Springer
15 years 3 months ago
Verifying Generics and Delegates
Recently, object-oriented languages, such as C , have been extended with language features prevalent in most functional languages: parametric polymorphism and higher-order function...
Kasper Svendsen, Lars Birkedal, Matthew Parkinson
ECOOP
1998
Springer
15 years 2 months ago
Predicate Dispatching: A Unified Theory of Dispatch
Predicate dispatching generalizes previous method dispatch mechanisms by permitting arbitrary predicates to control method applicability and by using logical implication between pr...
Michael D. Ernst, Craig S. Kaplan, Craig Chambers
SIGSOFT
2008
ACM
15 years 11 months ago
Alchemy: transmuting base alloy specifications into implementations
Alloy specifications are used to define lightweight models of systems. We present Alchemy, which compiles Alloy specifications into implementations that execute against persistent...
Shriram Krishnamurthi, Kathi Fisler, Daniel J. Dou...