Sciweavers

1748 search results - page 271 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
15 years 3 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud
POPL
2012
ACM
13 years 9 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
FAABS
2000
Springer
15 years 5 months ago
From Livingstone to SMV
To ful ll the needs of its deep space exploration program, NASAis actively supporting research and development in autonomy software. However, the reliable and cost-e ective develop...
Charles Pecheur, Reid G. Simmons
OOPSLA
1995
Springer
15 years 5 months ago
Subtypes vs. Where Clauses: Constraining Parametric Polymorphism
All object-oriented languages provide support for subtype polymorphism, which allows the writing of generic code that works for families of related types. There is also a need, ho...
Mark Day, Robert Gruber, Barbara Liskov, Andrew C....
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...