Sciweavers

303 search results - page 23 / 61
» Typing Safe Deallocation
Sort
View
128
Voted
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 7 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
149
Voted
CCR
2004
147views more  CCR 2004»
15 years 3 months ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
147
Voted
DASFAA
2009
IEEE
203views Database» more  DASFAA 2009»
15 years 10 months ago
Adaptive Safe Regions for Continuous Spatial Queries over Moving Objects
Abstract. Continuous spatial queries retrieve a set of time-varying objects continuously during a given period of time. However, monitoring moving objects to maintain the correctne...
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku
141
Voted
GPCE
2007
Springer
15 years 10 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
169
Voted
PADL
2012
Springer
13 years 11 months ago
Virtualizing Real-World Objects in FRP
We begin with a functional reactive programming (FRP) model in which every program is viewed as a signal function that converts a stream of input values into a stream of output va...
Daniel Winograd-Cort, Hai Liu, Paul Hudak