Filters








522 Hits in 3.5 sec

Flexible Bytecode for Linking in .NET

Alex Buckley, Michelle Murray, Susan Eisenbach, Sophia Drossopoulou
2005 Electronical Notes in Theoretical Computer Science  
We describe the scheme's integration with the .NET linking infrastructure, review important design decisions and report on experiences with the "Rotor" shared source version of .NET.  ...  We have designed and implemented a "flexible" dynamic linking scheme that binds bytecode as late as possible to the assemblies and classes available in a .NET execution environment.  ...  Acknowledgements We thank the Imperial SLURP group for helpful discussions, and the anonymous reviewers for their comments.  ... 
doi:10.1016/j.entcs.2005.02.036 fatcat:mmyq6q64sjfjvfzg7kyrqwi27a

NASA space safety standards and procedures for human-rating requirements [chapter]

Charles Herbert Shivers
2010 Space Safety Regulations and Standards  
The National Aeronautics and Space Administration of the United States of America (NASA) has arguably led this planet in space exploration and certainly has been one of two major leaders in those endeavors  ...  While NASA documents are the source of information presented herein, any and all views expressed herein and any misrepresentations of NASA data that may occur herein are those of the author and should  ...  pads, and communication systems.  ... 
doi:10.1016/b978-1-85617-752-8.10001-7 fatcat:ecsxrdlf2vcc7lwy2at4uzepri

Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O

Zongwei Zhou, Miao Yu, Virgil D. Gligor
2014 2014 IEEE Symposium on Security and Privacy  
Thus, they cannot include a variety of basic services available only in large and untrustworthy commodity systems; i.e., in giants.  ...  Using the USB subsystem as a case study, this paper illustrates the dramatic reduction of wimpy-kernel size and complexity; e.g., over 99% of the USB code base is removed.  ...  of the device-specific ones.  ... 
doi:10.1109/sp.2014.27 dblp:conf/sp/ZhouYG14 fatcat:6hof2a5kwndg3gy2v7ndsnmsli

Advanced eGovernment Information Service Bus (eGov-Bus)

2007 Informatică economică  
Requirements and specific rules of these life events are considered, and personalization of user preferences is supported. eGov-Bus is based on adaptable process management technologies, allowing for virtual  ...  The eGov-Bus project provides citizens and businesses with improved access to virtual public services, which are based on existing national eGovernment Web services and which support cross-border life  ...  the technical scope of the prototype based on the analysis of documents, in particular those from tasks WP3 to WP7, and also verification by competent persons of the validity of projections for volume  ... 
doaj:5481b77e057e4ab3b400020fac9f6ddd fatcat:45fqf2jzfjhgbj6qxef72yqch4

The Role of Coordination Analysis in Software Integration Projects [chapter]

Nuno F. Rodrigues, Nuno Oliveira, Luís S. Barbosa
2011 Lecture Notes in Computer Science  
The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation.  ...  How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process?  ...  The paper introduces a case study on verification of design time integration strategies. Section 2 sums up the methodology, and examples of its application are discussed in 3.  ... 
doi:10.1007/978-3-642-25126-9_16 fatcat:xweltzdjyzapvexur4xbdbwc3e

Development Platforms for Mobile Applications: Status and Trends

Damianos Gavalas, D Economou
2011 IEEE Software  
Better standardization (for example, fewer optional APIs and more detailed specifications) and stricter enforcement of standards (for example, using API verification initiatives and technology compatibility  ...  Issue description Java ME .NET CF Flash Lite Android Developer community and support* Extensive MSDN Extensive Recent, growing Market penetration* Extensive (also the basis of the Danger  ...  DAPHNE ECONOMOU is a lecturer in interactive multimedia and hypermedia at the University of the Aegean's Department of Cultural Technology and Communication.  ... 
doi:10.1109/ms.2010.155 fatcat:ottaolg3f5h3dc5mfwzk77onf4

Report of the HPC Correctness Summit, Jan 25--26, 2017, Washington, DC [article]

Ganesh Gopalakrishnan and Paul D. Hovland and Costin Iancu and Sriram Krishnamoorthy and Ignacio Laguna and Richard A. Lethin and Koushik Sen and Stephen F. Siegel and Armando Solar-Lezama
2017 arXiv   pre-print
In this study, we detail one of the most significant productivity challenges in achieving this goal, namely the increasing proclivity to bugs, especially in the face of growing hardware and software heterogeneity  ...  We close with the proposal for a two-day workshop in which the problems identified in this report can be more broadly discussed, and specific plans to launch these new research thrusts identified.  ...  The complexity of reasoning about numerical code depends on the gap between the specification and the implementation.  ... 
arXiv:1705.07478v1 fatcat:2rebouk2tvbqhcfthfhz5abd7i

Component technology - what, where, and how?

C. Szyperski
2003 25th International Conference on Software Engineering, 2003. Proceedings.  
In addition, the recent movement towards services, as well as the established world of objects, causes many to wonder what purpose components might have.  ...  This extended abstract summarizes the main points of my Frontiers of Software Practice (FOSP) talk at ICSE 2003.  ...  This approach enables the use of AsmL for specification and test of code implemented in any language hosted on the CLR.  ... 
doi:10.1109/icse.2003.1201255 dblp:conf/icse/Szyperski03 fatcat:aerwifjnkvbzffywixqguxsooy

Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX

Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. S. Alimgeer
2011 International Conference on Computer Networks and Information Technology  
This work intends to establish the formal basis to justify the claims put forth in the specification of ISNAP against PKM vI & v2.  ...  We focus on the 1 st and 2n d version of Privacy & Key Management (PKM) Protocols, which are implemented in the WiMAX architecture at present and compare their performance characteristics with another  ...  At present, these network specifications are being adopted by major service providers across the globe for deployment of wireless broadband services and last-mile solutions, termed under the name World-wide  ... 
doi:10.1109/iccnit.2011.6020925 fatcat:z762fsuiizd2rgz7va6zm2dsim

Security Protocol Verification: Symbolic and Computational Models [chapter]

Bruno Blanchet
2012 Lecture Notes in Computer Science  
implementations rather than specifications.  ...  This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol  ...  We thank Pierpaolo Degano for helpful comments on a draft of this paper. Sect. 2.2 is updated from [48] . This work was partly supported by the ANR project ProSe (decision ANR-2010-VERS-004-01).  ... 
doi:10.1007/978-3-642-28641-4_2 fatcat:fc32uobfpfbqboiqtfwj3fokee

Comparative Analysis of Quality and Environmental Management Strategic Implementation in Cement Industry

Filson Maratur Sidjabat, Risalatul Habibah, Martogi Pasaribu
2019 Media Ilmiah Teknik Lingkungan  
The author will analyze the comparison of strategies implemented by the three cement industries in implementing ISO 9001: 2015 and ISO 14001: 2015.  ...  The cement industry's activities have an impact on health and the environment, therefore a solution is needed to deal with the negative impacts of the cement industry operations.  ...   Implemented clear leadership structure  Build relationship on the basis mutual respect and trust with all stakeholders in the community  Improvement of human resource  Health, safety, and community  ... 
doi:10.33084/mitl.v4i2.1072 fatcat:gdnj5wf4v5dkxdxt4mdb5ik4he

Type-preserving compilation of end-to-end verification of security enforcement

Juan Chen, Ravi Chugh, Nikhil Swamy
2010 Proceedings of the 2010 ACM SIGPLAN conference on Programming language design and implementation - PLDI '10  
and much of our compiler from the trusted computing base (TCB), relying only on the DCIL type checker for bytecode verification and on the .NET virtual machine to faithfully execute the program.  ...  This is perhaps indicative of a bias in the SMT solving community to optimize for speed rather than for conciseness of proofs.  ...  We thank Trishul Chilimbi, Jeremy Condit, and several anonymous reviewers for their helpful comments on an earlier version of the paper; Shriram Krishnamurthi for providing us with Continue's policy; Nikolaj  ... 
doi:10.1145/1806596.1806643 dblp:conf/pldi/ChenCS10 fatcat:tkw7hu7vk5htzm4cnohkih6jim

Type-preserving compilation of end-to-end verification of security enforcement

Juan Chen, Ravi Chugh, Nikhil Swamy
2010 SIGPLAN notices  
and much of our compiler from the trusted computing base (TCB), relying only on the DCIL type checker for bytecode verification and on the .NET virtual machine to faithfully execute the program.  ...  This is perhaps indicative of a bias in the SMT solving community to optimize for speed rather than for conciseness of proofs.  ...  We thank Trishul Chilimbi, Jeremy Condit, and several anonymous reviewers for their helpful comments on an earlier version of the paper; Shriram Krishnamurthi for providing us with Continue's policy; Nikolaj  ... 
doi:10.1145/1809028.1806643 fatcat:fxmdoanjdbgu3es2cuokpwd3nu

Programming quality improvement in IBM [Technical forum]

D. L. Bencher
1994 IBM Systems Journal  
They were generic in nature, rather than laboratory- or product-specific, and could be used to augment any development process. In es- sence they were specific implementations of the principles.  ...  Verification can take such forms as: customer advisory coun- cils, making prototypes available for customer use, early support programs, and beta tests.  ... 
doi:10.1147/sj.331.0215 fatcat:ejbxevf2vvaove7ijmblm4tgru

How Does Customary International Law Change? The Case of State Immunity

Pierre-Hugues Verdier, Erik Voeten
2014 International Studies Quarterly  
Consequentially, a state's decision to apply a CIL norm should be a function of the extent to which the norm is practiced in the community of states it interacts with rather than the past behavior of the  ...  Because the continued existence of CIL depends on state practice, the potential precedential effect of defection encourages cooperation as long as states value the cooperative norm.  ...  If states share the belief that a rule is CIL, they should expect other states to apply it on a non-discriminatory basis. This does not mean that states always implement the most cooperative norm.  ... 
doi:10.1111/isqu.12155 fatcat:fwcsrz5s7bagdclwseaauw4y2u
« Previous Showing results 1 — 15 out of 522 results