We develop a control flow analysis for the Imperative Object Calculus. We prove the correctness with respect to two Structural Operational Semantics that differ in minor technical ...
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Abstract— Routers handle data packets from sources unresponsive to TCP’s congestion avoidance feedback. We are interested in the impact these sources have on AQM’s control of...
C. V. Hollot, Yong Liu, Vishal Misra, Donald F. To...
High-speed organizational networks running over leased fiber-optic lines or VPNs suffer from the well-known limitations of TCP over long-fat pipes. High-performance protocols like...
Vidhyashankar Venkataraman, Paul Francis, Murali S...
Wide Single Instruction, Multiple Thread (SIMT) architectures often require a static allocation of thread groups that are executed in lockstep throughout the entire application ker...