نتایج جستجو برای: run time leakage

تعداد نتایج: 1977427  

2003
Miklós Espák

Since the appearance of Java several tools have been developed to allow making dynamic changes in Java programs. In general, these tools trades the flexibility for the efficiency of the program. In this paper I present RtJAC, an aspect-oriented framework for Java based on JAC [3], which makes possible to create aspects, specify their join points and weave them into an application, all at run-ti...

2004
Hao Yu

Run-Time Optimization of Adaptive Irregular Applications. (August 2004) Hao Yu, B.S., Tsinghua University, PR China; M.S., Tsinghua University, PR China Chair of Advisory Committee: Dr. Lawrence Rauchwerger Compared to traditional compile-time optimization, run-time optimization could offer significant performance improvements when parallelizing and optimizing adaptive irregular applications, b...

1990
Josep Domingo-Ferrer

A new method is featured which solves the sofhvare integrity problem by properly coding rather than enciphering. Adopting the lengthy and expensive solution which consists of having the whole program signedlencrypted by an authority would require fiil decryption and secure storage for the whole program before execution, whereas one signed instruction, pipe-lined decoding-executing, and secure r...

Journal: :Transactions of the SDPS 2004
Yves Vandewoude Yolande Berbers

In this paper, the SEESCOA component model and its run-time system are presented. In the SEESCOA-project, a component methodology was developed that explicitly models component interaction using the port and connector concepts. Since non-functional constraints are important for embedded systems, they are modelled separately in contracts. Using this component interaction model, SEESCOA allows fo...

Journal: :Computers & Mathematics with Applications 2012
Gabriele Costa Ilaria Matteucci

Security and trust represent two different perspectives on the problem of guaranteeing the correct interaction among software components. Gate automata have been proposed as a formalism for the specification of both security and trust policies in the scope of the Security-by-Contract-withTrust (S×C×T) framework. Indeed, they watch the execution of a target program, possibly modifying its behavi...

Journal: :Higher-Order and Symbolic Computation 1999
Luke Hornof Trevor Jim

A certifying compiler takes a source language program and produces object code as well as a certi cate that can be used to verify that the object code satis es desirable prop erties such as type safety and memory safety Certifying compilation helps to increase both compiler robustness and program safety Compiler robustness is improved since some compiler errors can be caught by checking the obj...

1994
Lawrence Rauchwerger

Current parallelizing compilers cannot identify a signiicant fraction of fully parallel loops because they have complex or statically insuuciently deened access patterns. Since fully parallel loops arise frequently in practice, we have developed methods to speculatively execute loops concurrently. These methods can be applied to any loop, even if the iteration space of the loop is unknown, as i...

1992
Hans-Ulrich Heiss

We consider the dynamic task allocation problem in multicomputer system with multiprogramming. Programs are given as task interaction graphs that have to be mapped onto the processors at run-time. We propose a fast two-phase heuristic algorithm where phase 1 performs a hierarchic clustering of the tasks which is used by the second phase to map clusters of suitable size onto free partitions of t...

Journal: :Electr. Notes Theor. Comput. Sci. 2009
Lieven Desmet Wouter Joosen Fabio Massacci Katsiaryna Naliuka Pieter Philippaerts Frank Piessens Dries Vanoverberghe

This paper describes the S3MS.NET run time monitor, a tool that can enforce security policies expressed in a variety of policy languages for .NET desktop or mobile applications. The tool consists of two major parts: a bytecode inliner that rewrites .NET assemblies to insert calls to a policy decision point, and a policy compiler that compiles source policies to executable policy decision points...

2010
Jorge Ressia Lukas Renggli Tudor Gîrba Oscar Nierstrasz

Software must be constantly adapted due to evolving domain knowledge and unanticipated requirements changes. To adapt a system at run-time we need to reflect on its structure and its behavior. Objectoriented languages introduced reflection to deal with this issue, however, no reflective approach up to now has tried to provide a unified solution to both structural and behavioral reflection. This...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید