Sciweavers

800 search results - page 127 / 160
» XML access control using static analysis
Sort
View
ESOP
2001
Springer
15 years 7 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
NIME
2004
Springer
97views Music» more  NIME 2004»
15 years 8 months ago
Live Cinema: Designing an Instrument for Cinema Editing as a Live Performance
This paper describes the design of an expressive tangible interface for cinema editing as a live performance. A short survey of live video practices is provided. The Live Cinema i...
Michael Lew
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
15 years 8 months ago
The Succinct Solver Suite
Abstract. The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. Th...
Flemming Nielson, Hanne Riis Nielson, Hongyan Sun,...
CORR
2010
Springer
224views Education» more  CORR 2010»
15 years 3 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam
PLDI
2011
ACM
14 years 6 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...